Resume
Skills
Security Research | Application Security | Red Teaming |
Network Security | Penetration Testing | Embedded System Security |
Computer Security | Reverse Engineering | Control System Security |
Work experience
Threat Researcher at Trend Micro
Oct 2018 through Feb 2024
- Led multiple research projects, managing time-lines, research direction, and team coordination
- Conducted security assessments, uncovering vulnerabilities in multiple devices and notifying ZDI
- Developed a method to identify customers of cloud services
- Built, maintained, and monitored hyper-realistic factory honeypots, establishing a fictitious company to enhance realism and capture cyber threats
- Collaborated on several research projects, leading to the creation of white papers, blog content, conference presentations, and media coverage
- Tested Databricks and Retrieval-Augmented Generation (RAG) technologies to support a research project, optimizing data processing and information retrieval
Senior Security Consultant at Revolutionary Security
Oct 2017 through Sept 2018
- Performed programmatic and technical threat model for product development organizations
- Managed and executed pentesting and vulnerability assessments to evaluate and enhance the security of both corporate networks and industrial control systems
- Executed vulnerability assessment of sub-GHz radio networks and hardware
Information Assurance Engineer at Leidos (formerly Lockheed Martin IS&GS)
Oct 2012 through Oct 2017
- Led pentesting engagements and vulnerability assessments to verify the security of corporate, industrial control, point of sale and Internet service provider systems
- Mentored junior consultants in industrial control system assessment methodologies
- Discovered multiple 0day vulnerabilities in industrial control systems
- Communicated complex technical details effectively to C-level management
- Developed content for new and existing client offerings
Lead Analyst - Security Assessments at General Electric
Mar 2011 - Oct 2012
- Performed software and hardware security assessments for intra-company organizations
- Led root-cause analysis investigations in response to product security incidents
- Directed small, agile, global assessment teams
- Trained analysts in fuzzing, reversing, and exploitation of control and embedded systems
Security Consultant at Digital Bond
Jan 2008 - Mar 2011
- Performed security assessments of Industrial Control Systems, Smart Grid, and Corporate Networks
- Generated custom Meterpreter scripts for complex ICS attacks
- Produced and instructed a protocol fuzzing, exploitation development, and firmware analysis curriculum
Computer and Network Security Analyst at Sandia National Laboratories
Feb 2007 - Jun 2007
- Analyzed and correlated network traffic with IDS alerts
- Performed research on network monitoring, network obfuscation techniques, and malware propagation
- Led security evaluations on embedded collaboration devices
- Contributed to the design and development of a security platform for SCADA protection (OPSAID)
Computer and Network Security Intern at Sandia National Laboratories
Nov 2004 - Feb 2007
- Led and managed the open source release of NetState (a unique network monitoring system)
- Developed and administrated an attack and defense simulation network for forensic analysis
- Performed security evaluations of various architectures, providing detailed remediation plans and recommendations
Technical Experience
- 10+ years experience with *nix based operating systems
- 10+ years experience with Industrial Control System security
- 10+ years experience installing, configuring and maintaining computer networks
- 5+ years security research
- Familiar with the following programming languages: C/C++, IA32, Perl, Python, SQL, Shell scripting
Education
- Bachelor of Science in Computer Science
- California State University - Hayward in Hayward, CA
- Aug 2004 - Aug 2006
- Associate of Science in Computer Science
- Las Positas College in Livermore, CA
- Sep 2001 - Aug 2004
Training
- Mobile and Telecom Applied Hacking and Reverse Engineering by Philippe Langlois
- REcon - Montreal, ON
- Jun 2016
- Hardware Hacking by Joe Grand
- REcon in Montreal, ON
- Jun 2015
- Exploit Laboratory by Saumil Shah
- REcon in Montreal, ON
- Jun 2014
- Unethical Hacking
- Immunity, Inc. in Miami, FL
- Nov 2008
- SEC 503: Intrusion Detection In-Depth
- SANS in Monterey, CA
- May 2007
Publications
A Survey of Cloud-Based GPU Threats and Their Impact on AI, HPC, and Cloud Computing
Numaan Huq, Philippe Lin, Roel Reyes, Charles Perine. (2024). "A Survey of Cloud-Based GPU Threats and Their Impact on AI, HPC, and Cloud Computing." Trend Micro.
Distributed Energy Generation Gateway (In)Security
Philippe Z Lin. (2024). "Distributed Energy Generation Gateway (In)Security." Trend Micro.
MQTT and M2M: Do You Know Who Owns Your Machine’s Data?
Ryan Flores, Charles Perine. (2023). "MQTT and M2M: Do You Know Who Owns Your Machine’s Data?." Trend Micro.
Examining Security Risks in Logistics APIs Used by Online Shopping Platforms
Ryan Flores, Charles Perine, Lord Remorin, Roel Reyes. (2022). "Examining Security Risks in Logistics APIs Used by Online Shopping Platforms." Trend Micro.
Attacks From 4G/5G Core Networks: Risks of the Industrial IoT in Compromised Campus Networks
Philippe Z Lin, Charles Perine, Rainer Vosseler. (2021). "Attacks From 4G/5G Core Networks: Risks of the Industrial IoT in Compromised Campus Networks." Trend Micro.
Lost in Translation: When Industrial Protocol Translation Goes Wrong
Marco Balduzzi, Luca Bongiorni, Ryan Flores, Philippe Z Lin, Charles Perine, Rainer Vosseler. (2020). "Lost in Translation: When Industrial Protocol Translation Goes Wrong." Trend Micro.
Caught in the act: Running a realistic factory honeypot to capture real threats
Stephen Hilt, Federico Maggi, Charles Perine, Lord Remorin, Martin Rösler, Rainer Vosseler. (2020). "Caught in the act: Running a realistic factory honeypot to capture real threats." Trend Micro.
Threat Modeling NetDDE Vulnerabilities in Control Systems
Jason Holcomb, Charles Perine, Xavier Panadero, Luis Mora. (2008). "Threat Modeling NetDDE Vulnerabilities in Control Systems." Digital Bond.
Talks
Attacks From the 4G/5G Core
Talk at S4: Fillmore Miami Beach, Miami Beach, FL
Cyber Security Weekly Podcast Episode 226 – Faking a Factory: Creating and Operating a Realistic Honeypot – BlackHat Asia 2020 takeaway
Podcast at Cyber Security Weekly Podcast, Singapore, SG
Good to Bad: When Industrial Protocol Translation Goes Wrong
Talk at University of Bristol - CRITIS: Online, Bristol, UK
Faking a Factory: Creating and Operating a Realistic Honeypot
Talk at Blackhat Asia: Online, Singapore, SG
Threat Modeling NetDDE Vulnerabilities in Control Systems
Talk at S4: Kovens Conference Center at FIU, North Miami, FL