Lead Associate at Booz Allen Hamilton
Baltimore, Maryland Area
Currently responsible for reverse engineering malware attained from multiple sources. Performing both static and dynamic analysis of the malware using standard tools such as IDA Pro,Ghidra,and OllyDbg, I develop IDS signatures based on the network activity to aid in future detection. I track the malicious software in order to eliminate duplicate work efforts as well as helping... Currently responsible for reverse engineering malware attained from multiple sources. Performing both static and dynamic analysis of the malware using standard tools such as IDA Pro,Ghidra,and OllyDbg, I develop IDS signatures based on the network activity to aid in future detection. I track the malicious software in order to eliminate duplicate work efforts as well as helping to identify unknown malware by correlating activity with currently identified malware. I am responsible for interfacing with clients on a daily basis providing updates on current malicious activity in addition to providing weekly and monthly performance reports highlighting high priority activity. As a lead, I am interview new applicants for the malware team and provide training to individuals selected to be part of our elite team. Typical tools utilized are IDA Pro, OllyDbg, Windbg, Sysinternals suite, regshot, capturebat, fakedns, OfficeMalScanner, PDF Disector, volatility, and RedLine. Multiple other open source tools are also used in addition to the primary tools listed. Operating systems and tools used to create the malware reversing environment include VMWare, Windows XP, Windows 2000, Windows 2003, Windows 7, and Linux.Achieved the following certifications:CompTIA Security+ SY0-401 GIAC Penetration Tester (GPEN) CTF Challenge Coin winnerGIAC Exploit Researcher and Advanced Penetration Tester (GXPN) CTF Challenge Coin winnerGIAC Advanced Exploit Development for Penetration Testers SEC760 CTF Challenge Coin winnerGIAC Certified Forensic Analyst (GCFA)SANS BETA TFT570 Class - Red/Blue Team Based TrainingCertified Reverse Engineer Analyst (CREA)Certified Expert Reverse Engineer Analyst (CEREA)Microsoft Certified Technology Specialist (MCTS WIndows 2003 Server)
What company does Patrick Jones work for?
Patrick Jones works for Booz Allen Hamilton
What is Patrick Jones's role at Booz Allen Hamilton?
Patrick Jones is Lead Associate
What industry does Patrick Jones work in?
Patrick Jones works in the Information Technology and Services industry.
📖 Summary
Lead Associate @ Booz Allen Hamilton Currently responsible for reverse engineering malware attained from multiple sources. Performing both static and dynamic analysis of the malware using standard tools such as IDA Pro,Ghidra,and OllyDbg, I develop IDS signatures based on the network activity to aid in future detection. I track the malicious software in order to eliminate duplicate work efforts as well as helping to identify unknown malware by correlating activity with currently identified malware. I am responsible for interfacing with clients on a daily basis providing updates on current malicious activity in addition to providing weekly and monthly performance reports highlighting high priority activity. As a lead, I am interview new applicants for the malware team and provide training to individuals selected to be part of our elite team. Typical tools utilized are IDA Pro, OllyDbg, Windbg, Sysinternals suite, regshot, capturebat, fakedns, OfficeMalScanner, PDF Disector, volatility, and RedLine. Multiple other open source tools are also used in addition to the primary tools listed. Operating systems and tools used to create the malware reversing environment include VMWare, Windows XP, Windows 2000, Windows 2003, Windows 7, and Linux.Achieved the following certifications:CompTIA Security+ SY0-401 GIAC Penetration Tester (GPEN) CTF Challenge Coin winnerGIAC Exploit Researcher and Advanced Penetration Tester (GXPN) CTF Challenge Coin winnerGIAC Advanced Exploit Development for Penetration Testers SEC760 CTF Challenge Coin winnerGIAC Certified Forensic Analyst (GCFA)SANS BETA TFT570 Class - Red/Blue Team Based TrainingCertified Reverse Engineer Analyst (CREA)Certified Expert Reverse Engineer Analyst (CEREA)Microsoft Certified Technology Specialist (MCTS WIndows 2003 Server) Senior Computer Security Professional @ Computer Sciences Corp Mr. Jones is the technical director of the Strikeforce Vulnerability and Penetration testing team and is responsible for the development and understanding of information security requirements and procedures for assessing network security, host-based security, vulnerability studies, and application design through detailed field analysis. He also performs local and wide area network vulnerability assessments and intrusion tracking activities/incident response in order to provide customers with better information security (INFOSEC) and computer security (COMPUSEC). Mr. Jones has become the lead engineer in wireless assessment technologies and as such, trains and assists teammates when performing wireless assessments. As the technical director of the VA Team, Mr. Jones has become proficient in the operation and analysis of CSC’s network security analysis tool, Hydra Expert Assessment Technology (H.E.A.T.). While running Hydra is an integral part of the Security Test and Evaluation (ST&E) procedure, it is the ability to expand on the data gathering methods and the vulnerability exploitation, which makes the difference. While Mr. Jones possesses knowledge of other tools like COPS, SATAN, ISS, strobe, and Crack, they are not often used in the field. Mr. Jones has extensive working knowledge of many ad hoc programs such as NMAP, nikto, paros, hunt, dsniff, wikto, wireshark, metasploit, snort, brutus, kismet, aircrack, all of which are assessment tools that allow network engineers to add to the success of a ST&E. From November 1996 to February 2009 (12 years 4 months) Annapolis Junction, MD
Introversion (I), Intuition (N), Thinking (T), Perceiving (P)
12 year(s), 4 month(s)
Unlikely
Likely
There's 100% chance that Patrick Jones is seeking for new opportunities
Enjoy unlimited access and discover candidates outside of LinkedIn
Trusted by 400K users from
76% of Fortune 500 companies
The most accurate data ever
Hire Anyone, Anywhere
with ContactOut today
Making remote or global hires? We can help.
No credit card required
Patrick Jones's Social Media Links
/company/b... /school/st...