:: hiddenillusion :: ... look beyond

Glenn P. Edwards Jr. is an inquisitive and motivated forensicator looking to advance his technical skills in Cloud, Enterprise, Mac and Memory Forensics. Having a thirst for knowledge paired with strong analytical skills has enabled him to both successfully manage and provide assistance across various high profile and complex engagements including those related to nation state adversaries, credit card breaches and malware outbreaks.

Education

Experience

  • 2016

    FireEye

    Principal Incident Response Consultant

    December 2016 - Present

  • 2016

    BSidesNYC

    Co-Founder

    January 2016 - Present

  • 2013

    FireEye

    Sr. Incident Response Consultant

    April 2013 - December 2016

  • 2013

    Bridgewater Associates

    Vulnerability Management Analyst

    February 2013 – April 2013

  • 2011

    Foundstone

    Sr. Consultant

    May 2011 – February 2013

    Worked as a Sr. Consultant on Foundstone's Incident Response team where I specialized in Digital Forensics and Malware Analysis. Additionally, I co-taught the Malware Forensics & Incident Response Education (MFIRE) course (BlackHat Vegas ’12)

  • 2010

    Center for Internet Security

    Sr. Analyst

    November 2010 – April 2011

    Worked as a Sr. Analyst on the Multi-State Information Sharing and Analysis Center’s (MS-ISAC) CERT, a division of the Center for Internet Security (CIS), where I conducted Digital Forensics Examinations and Malware Analysis to Local, State and Federal Government entities.

  • 2010

    Symantec

    Security Analyst

    February 2010 – November 2010

    Worked as a security analyst at the Cyber Security Analysis Center (CSAC) in a project with the State of New York - Office of Cyber Security and Critical Infrastructure Coordination (CSCIC) and Multi-State Information Sharing and Analysis Center (MS-ISAC). Responsibilities and daily tasks included Intrusion Detection, Malware Analysis and Network/Web Application Vulnerability Testing.

Publications

  • 2012 | Let Me In - An outline of how Incident Responders can get into a locked system | Digital Forensics Magazine (11)
  • 2012 | Using REMNux to analyze PE files | Hakin9 Magazine (Vol. 7, No. 6)

Training

  • Windows Malware and Memory Forensics Training | The Volatility Project
  • EnCase's Computer Forensics II, Advanced Internet Forensics and Macintosh-Linux Examinations | Guidance Software
  • Internet Forensics and Microsoft Windows Registry Forensics | Access Data
  • Offsec 101 - Pentesting with BackTrack | Offensive Security
  • Computer Forensics Training | InfoSec Institute

Certifications

  • GREM (GIAC Reverse Engineering Malware)
  • GCFA (GIAC Certified Forensic Analyst)
  • GCIH (GIAC Certified Incident Handler)
  • CEH (Certified Ethical Hacker)
  • OSCP (Offensive Security Certified Professional)
  • Security+ (CompTIA Security+)

Buzzwords

    GitHub • IDA Pro • Linux • Mac • Plaso/Log2timeline • REMnux • SIFT • The Sleuth Kit • Volatility • Windows • X-ways • dfir • forensics • incident response • malware • open source • python • reverse engineering • scripting

Location