I started tinkering with webpage vulnerabilities when I was around 17 years old. I had no clue that tinkering was a real job. I was soon, purposefully, infecting my own computers with spyware to see what happens and how they work. Then I joined the military (around 19 years old) as a Signals Intelligence Analyst (National Guard 2003, active duty Army 2005, and ended my career last year in the reserves). I've done some threat targeting downrange in Afghanistan and Iraq and even more targeting back here stateside. I left the targeting world for a short time when I worked at the Department of Energy as their Senior Reverse Engineer. While there, I had a great Team Lead who pushed my technical skills at every opportunity. Current, I am working at Cylance/Blackberry as a Principal Threat Researcher, where I am back to hunting. As you can see, my career grew up in the shadows of digital conversations. I saw and learned so much. I understood how pieces fit together. I learned weaknesses in targets and how to exploit them. Sometimes I knew my target better than my family. I was trained to become an expert in the area I was assigned. Even as a contractor for the Department of Defense, I was still in this shadow. People’s lives depended on my ability to put a puzzle together. A target is a target and I had better have my facts right. A network is a network - human or digital. In the shadows, it’s one in the same. I live for hunting. Discovery of the unknown while staying unknown.