SEEKING WORK
Location: Los Angeles, CA, USA
Remote: Yes, or local to Los Angeles
Willing to relocate: No
Technologies: Python, C/C++, C#, JavaScript, x86 Assembly, YARA, Snort, Bash/zsh, PowerShell, IDA Pro/Hexrays, x64dbg, DNSpy, Cobalt Strike, Impacket, Mythic, Splunk, XWays, Volatility, Wireshark, Burp Suite, Encase, Microsoft Office/GSuite, AWS, Azure, GCP, Kubectl, IceKube, Jenkins, GitHub Actions, Git
Résumé/CV: https://www.mayer.cool/resume.pdf
Email: dan@mayer.cool
SECURITY ENGINEER/SECURITY RESEARCHER/RED TEAM OPERATOR/REVERSE ENGINEER =====================
Howdy, I'm Dan. I currently am employed as SpecterOps, a premier red team consultancy. I execute bespoke offensive security and application security assessments including binary reverse engineering, vulnerability identification, and attack path assessment via kubernetes and active directory abuse.
In my free time I create video game cheats. You may have seen some of my previous blog posts on the top of Hacker News, emphasis on "hacker" [1][2]!
I will say that I am honestly quite happily employed but I still think it is always worth putting my resume out into the aether.
If my skills seem valuable to your organization, please don't hesitate to reach out - I am very interested in/available for contract work as well!
In my free time I create video game cheats. You may have seen some of my previous blog posts on the top of Hacker News, emphasis on "hacker" [1][2]!
I will say that I am honestly quite happily employed but I still think it is always worth putting my resume out into the aether.
If my skills seem valuable to your organization, please don't hesitate to reach out - I am very interested in/available for contract work as well!
[1]: https://news.ycombinator.com/item?id=35824115
[2]: https://news.ycombinator.com/item?id=38525978