Joseph Fleming

Malware Reverse Engineer at PhishLabs
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
San Jose, California, United States, US

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

You need to have a working account to view this content.
You need to have a working account to view this content.

Experience

    • United States
    • IT Services and IT Consulting
    • 1 - 100 Employee
    • Malware Reverse Engineer
      • Jan 2018 - Apr 2020

      Remote - Fully automated processing of Trickbot to extract command and control data and targets. - Reverse Engineered various malware banking trojans to determine functionality for both Windows Desktop and Android mobile platforms. - Developed dozens of python scripts to decode and decrypt data sections of different malware samples. - Created blog articles, videos and and malware analysis presentations for clients.

    • Threat Intelligence Research / Reverse Engineer
      • Oct 2015 - Feb 2017

      - Tracked daily threat data collected from internal and external sources, including spam traps, honey nets and subscription services. - Reverse engineered hundreds of malware samples to retrieve domains, IP addresses, strings and configuration data. - Wrote automated Locky ransomware configuration extractor in Python. Processed nearly two thousand Locky binaries to retrieve configuration data and track campaign trends. - Created Yara rule based tracking system to monitor threats… Show more - Tracked daily threat data collected from internal and external sources, including spam traps, honey nets and subscription services. - Reverse engineered hundreds of malware samples to retrieve domains, IP addresses, strings and configuration data. - Wrote automated Locky ransomware configuration extractor in Python. Processed nearly two thousand Locky binaries to retrieve configuration data and track campaign trends. - Created Yara rule based tracking system to monitor threats submitted to VirusTotal and feed data to SIEM. - Wrote over 100 Yara rules to monitor for recent threat submissions covering ransomware, banking and POS threats. - Authored a dozen technical articles for internal use, blog articles as well as threat reports delivered to clients. Show less

    • Senior Computer Scientist
      • Oct 2014 - Oct 2015

      Menlo Park, CA Analyzed 8 SIM card brands for vulnerabilities using side-channel power analysis and fuzzing. Developed scripts in Python to communicate with SIM cards.

    • United States
    • Defense and Space Manufacturing
    • 700 & Above Employee
    • Advanced Reverse Engineer
      • Jun 2013 - Jun 2014

      - Successfully developed, in three months, a test platform to simulate a nation-wide communications network, which others were unable to develop over the prior year. - Maintained and upgraded java code and SQL procedures for a large-scale network visualization tool. - Analyzed dozens of malware files and attended GREM course. - Demonstrated test cases using Metasploit to run against network vulnerabilities.

    • Computer Scientist
      • Feb 2005 - 2012

      Malware Research Create Rootkit Detection Mechanisms Develop Hardware Assisted Hypervisor Reverse engineer binaries Ida Pro, windbg, Ollydbg...

    • United States
    • Armed Forces
    • 700 & Above Employee
    • Officer
      • 2002 - 2005

      Currently in the reserves.

Education

  • Michigan State University
    Master's degree, Computer Science
    1995 - 1998
  • Michigan State University
    Bachelor's degree, Computer Science
    1990 - 1995
  • National Cryptologic Officer Basic Course
    Three month course on national security.

Community

You need to have a working account to view this content. Click here to join now