
AUSTIN HEATH
+1 601-596-2842 | austin@heath.codes
https://austin.heath.codes
Willing to relocate
Clearance: Top Secret (TS/SCI) with CI Polygraph
EDUCATION
Georgia Institute of Technology Atlanta, GA
Master of Science, Computer Science (Specialization: Computing Systems), 4.0 GPA December 2022
Mississippi State University Starkville, MS
Bachelor of Science, Computer Engineering, 3.61 GPA December 2017
EXPERIENCE
Senior Software Engineer June 2021 – Present
U.S. Army Cyber Command - Cyber Solutions Development Fort Gordon, GA
- Managed a team of 12 security researchers using tools like IDAPro, Ghidra, LLVM, and QEMU, to research,
discover, and exploit vulnerabilities in embedded devices and Windows applications, enabling the organization
to avoid costs procuring similar vendor solutions, resulting in a significant savings.
- Developed a shellcode library using C, Python, and CMake, enabling 20 developers to cross-compile ubiquitous
shellcodes for Intel, ARM, MIPS, and PowerPC processor architectures, eliminating duplicate shellcodes across
9 exploit development projects.
- Triaged 5 public vulnerability disclosures, releasing 7 bespoke exploit tools, providing initial access to computer
networks of interest for 6 operations teams across 3 organizations and 4 uniformed services.
- Instructed 5 operations teams on the effective use of exploit tools, increasing stakeholder interaction and
influencing organizational policy to emphasize consistent stakeholder engagement.
- Hosted 12 monthly training events covering reverse-engineering and exploit development techniques,
increasing the organization’s number of trained security researchers by 25%.
- Overhauled the organization’s technical documentation process using Markdown, LaTeX, Pandoc, CMake, and
Python, enabling developers to better detect documentation errors prior to release.
Software Engineer February 2018 – May 2021
U.S. Army Cyber Command - Cyber Solutions Development Fort Gordon, GA
- Redesigned the organization’s binary obfuscation methods using LLVM, rendering obfuscated artifacts
unrecognizable compared to the original, inhibiting reverse-engineering efforts and preventing developers from
spending 40 hours manually obfuscating existing projects.
- Implemented 11 modules for a Python exploit framework, automating common operator tasks and reducing
50% of human interaction, increasing mission efficiency for 5 operations teams.
- Automated the organization’s compilation, testing, release, and deployment process by integrating existing
projects into GitLab CI, expediting tool development and release for 3 developer teams.
- Obfuscated web-based malware written in PHP using open source software and designed command, control,
and configuration mechanisms using Python, enabling 3 operations teams across 2 uniformed services to
maintain persistent access to web targets of interest.
CERTIFICATIONS
Offensive Security Certified Professional (OSCP)
Certified Information Systems Security Professional (CISSP)
GIAC Reverse Engineering Malware (GREM)
CompTIA Security+ (Sec+)
Certified Ethical Hacker (CEH)
Cisco Certified Network Associate (CCNA)
TECHNICAL SKILLS
Languages: Python, C/C++, x86, amd64, MIPS, ARM, PowerPC, TileGX, Java
Libraries: gRPC, OpenMP/MPI, libvirt, libcurl, POX, Mininet, OpenFlow, LLVM, Z3, NumPy, SciPy, pandas, pwntools
Developer Tools: Git, GitLab CI, Atlassian Bamboo, Jupyter, Docker, QEMU, GDB, WinDbg, angr, AFL, KLEE
Applications: VMware, VirtualBox, Vagrant, Ghidra, IDAPro, BinaryNinja, BinDiff
Frameworks: Metasploit, WordPress