Joshua Homan is currently a member of the FireEye Labs Advanced Reverse Engineering team (FLARE) where he provides reverse engineering support to active incident response engagements and intelligence analysis efforts. Josh contributed to the SYNFul Knock white paper that covers a backdoor for Cisco router firmware. Previous experience includes incident response for a fortune 500 company and a security analyst for the DoD. Josh earned a M.S. in Computer Science from the University of West Florida.
Matthew Williams is a Senior Reverse Engineer on the FireEye Labs Advanced Reverse Engineering Team (FLARE) team. Prior to joining the FLARE team, he was the Principal Malware Analyst and Incident Responder for a Department of Defense (DoD) SOC. After earning his B.S. in Computer Science, Matt also spent time at the National White Collar Crime Center (NW3C) developing and delivering digital forensics training to law enforcement agencies nationwide.
William Ballenthin is a reverse engineer on FireEye's FLARE team. He enjoys researching novel forensic analysis techniques for incident responders and developing tools in Python. Recently William has worked on function similarity metrics, file system drivers, and Android malware. Prior to six years at Mandiant/FireEye, he studied at Columbia University and earned a degree in Computer Science.