:: hiddenillusion :: ... look beyond

Glenn P. Edwards Jr. is an inquisitive and motivated forensicator looking to advance his knowledge and technical skills in Hunting large data sets and Incident Response/Digital Forensics. Having a thirst for being challenged paired with strong analytical skills has enabled him to both successfully manage and provide assistance across various high profile, large and complex engagements including those related to nation state adversaries, credit card breaches and malware outbreaks.



  • 2016


    Principal Incident Response Consultant

    December 2016 - Present

  • 2016



    January 2016 - Present

  • 2013


    Sr. Incident Response Consultant

    April 2013 - December 2016

  • 2013

    Bridgewater Associates

    Vulnerability Management Analyst

    February 2013 – April 2013

  • 2011


    Sr. Consultant

    May 2011 – February 2013

    Worked as a Sr. Consultant on Foundstone's Incident Response team where I specialized in Digital Forensics and Malware Analysis. Additionally, I co-taught the Malware Forensics & Incident Response Education (MFIRE) course (BlackHat Vegas ’12)

  • 2010

    Center for Internet Security

    Sr. Analyst

    November 2010 – April 2011

    Worked as a Sr. Analyst on the Multi-State Information Sharing and Analysis Center’s (MS-ISAC) CERT, a division of the Center for Internet Security (CIS), where I conducted Digital Forensics Examinations and Malware Analysis to Local, State and Federal Government entities.

  • 2010


    Security Analyst

    February 2010 – November 2010

    Worked as a security analyst at the Cyber Security Analysis Center (CSAC) in a project with the State of New York - Office of Cyber Security and Critical Infrastructure Coordination (CSCIC) and Multi-State Information Sharing and Analysis Center (MS-ISAC). Responsibilities and daily tasks included Intrusion Detection, Malware Analysis and Network/Web Application Vulnerability Testing.


  • 2012 | Let Me In - An outline of how Incident Responders can get into a locked system | Digital Forensics Magazine (11)
  • 2012 | Using REMNux to analyze PE files | Hakin9 Magazine (Vol. 7, No. 6)


  • Windows Malware and Memory Forensics Training | The Volatility Project
  • EnCase's Computer Forensics II, Advanced Internet Forensics and Macintosh-Linux Examinations | Guidance Software
  • Internet Forensics and Microsoft Windows Registry Forensics | Access Data
  • Offsec 101 - Pentesting with BackTrack | Offensive Security
  • Computer Forensics Training | InfoSec Institute


  • GREM (GIAC Reverse Engineering Malware)
  • GCFA (GIAC Certified Forensic Analyst)
  • GCIH (GIAC Certified Incident Handler)
  • CEH (Certified Ethical Hacker)
  • OSCP (Offensive Security Certified Professional)
  • Security+ (CompTIA Security+)


    Bulk Extractor • EnCase • GitHub • Linux • Log2timeline/Plaso • Mac • REMnux • The Sleuth Kit • Timesketch • Volatility • WinHex/X-Ways • Windows • YARA • bash • dfir • forensics • incident response • malware • open source • python • reverse engineering • scripting