corbin_souffrant_resume.pdf

1
CORBIN SOUFFRANT Milpitas CA [email protected] Work History Education Skills Program Analysis: IDA, WinDBG, GDB Languages: C/C++, Python, x86/x64. Various Preferences: Arch Linux and Windows 7 (OS), Emacs (Text Editor), git (Version Control) Outside of Work CTF - I play with Samurai. Previously with UIUCTF, where I have helped write and test challenges for our first CTF this year, also participated in CSAW '13 Finals. Analyze Conference - Organizer of a security conference held during RSA. More info at analyze.cc or @analyzecon Jun 2014 - present Research Engineer Scientist FireEye Exploit Research team in FELabs Owner of the Zero day Discovery Center. Automated system that analyzed files shared from customers, as well as from various external sources. Used a set of custom heuristics to determine if sample was worth manual analysis. Developed a new exploit analysis framework. Discovered a Use After Free exploit in Adobe Reader (CVE-2015-5484) using a generic exploit detection script created for the framework. Provided root cause analysis of exploits as well as crash analysis for possible new ones. Supported various teams with exploit related questions. A subset of blogs written can be found at goo.gl/UfDk8D Jul 2013 - Sep 2013 Vulnerability Research and Development Intern Raytheon SIGOVS Discovered bugs using fuzzing and source code auditing. Developed a custom test harness for the fuzzer. Worked with browser security and applications on both x86 and ARM architectures. Mar 2012 - Nov 2012 Researcher University of Illinois Worked with Professor Sam King to design and implement an application framework for general purpose robots. This involved developing an API to communicate with the robot via a web interface and android application. Also wrote applications for the robot using python and C++. 2010 - 2014 B.Sc Computer Science University of Illinois at Urbana-Champaign Relevant Coursework - Network Security, Applied Cryptography, Security I, Security Lab, Digital Forensics, Malware Analysis, Security Reading Group. https://www.visualcv.com/guest-sou

Upload: erica-butler

Post on 14-Sep-2015

214 views

Category:

Documents


1 download

TRANSCRIPT

  • CORBIN SOUFFRANTMilpitas CA [email protected]

    Work History

    Education

    SkillsProgram Analysis: IDA, WinDBG, GDBLanguages: C/C++, Python, x86/x64.Various Preferences: Arch Linux and Windows 7 (OS), Emacs (Text Editor), git (Version Control)

    Outside of WorkCTF - I play with Samurai. Previously with UIUCTF, where I have helped write and test challenges for our first CTF this year, alsoparticipated in CSAW '13 Finals.Analyze Conference - Organizer of a security conference held during RSA. More info at analyze.cc or @analyzecon

    Jun 2014 - present Research Engineer ScientistFireEyeExploit Research team in FELabs

    Owner of the Zero day Discovery Center.Automated system that analyzed files shared from customers, as well as from various externalsources. Used a set of custom heuristics to determine if sample was worth manual analysis.

    Developed a new exploit analysis framework.Discovered a Use After Free exploit in Adobe Reader (CVE-2015-5484) using a generic exploitdetection script created for the framework.

    Provided root cause analysis of exploits as well as crash analysis for possible new ones.Supported various teams with exploit related questions.A subset of blogs written can be found at goo.gl/UfDk8D

    Jul 2013 - Sep 2013 Vulnerability Research and Development InternRaytheon SIGOVSDiscovered bugs using fuzzing and source code auditing. Developed a custom test harness for thefuzzer. Worked with browser security and applications on both x86 and ARM architectures.

    Mar 2012 - Nov 2012 ResearcherUniversity of IllinoisWorked with Professor Sam King to design and implement an application framework for generalpurpose robots. This involved developing an API to communicate with the robot via a web interface andandroid application. Also wrote applications for the robot using python and C++.

    2010 - 2014 B.Sc Computer ScienceUniversity of Illinois at Urbana-ChampaignRelevant Coursework - Network Security, Applied Cryptography, Security I, Security Lab, DigitalForensics, Malware Analysis, Security Reading Group.

    https://www.visualcv.com/guest-sou

    CORBIN SOUFFRANTWork HistoryJun 2014 - presentResearch Engineer ScientistFireEye

    Vulnerability Research and Development InternRaytheon SIGOVS

    ResearcherUniversity of Illinois

    Education2010 - 2014B.Sc Computer ScienceUniversity of Illinois at Urbana-Champaign

    SkillsOutside of Work