1

Andrew McNicol

Andrew McNicol (@primalsec) is a Python junkie who is currently the lead for a web application penetration testing team and mentor for the SANS institute. Previously, he worked on an incident response team focusing on malware analysis and network forensics. He is always looking for new Python tricks or new ways to gain code execution on remote systems. He is one of the founders and lead authors of Primal Security Podcast, focusing on Python scripting, exploit development, and CLI Kung Fu.  Andrew holds numerous technical security qualifications, most notably Offensive Security Certified Expert (OSCE), and Offensive Security Certified Professional (OSCP).

Email: andrew@primalsecurity.net

matt

Matt Foreman

Matt Foreman (i_am4man) is the Lead Security Consultant and a Managing Partner at Shield 7 Consulting. A Security Consulting Firm based in Maryland with customers ranging from Hospitals to Energy Companies and Fortune 1000 clients. Matt is the lead of the Penetration Testing team, and Security Architecture Team. He also is a co-founder of the Primal Security Podcast and Blog; which focuses on CTF’s, Malware Analysis, Penetration Testing, and Security Research. Mr Foreman has been in the Security Industry for over ten years, and has held positions ranging from Firewall Administrator, Penetration Tester, and developing a Managed Security Practice.

luke

Luke Hudson

Luke Hudson (@3z5tuff, ez57uff on freenode) is a security engineer who began working in IT in 2009, moving into the information security realm in 2011. He is currently working toward sharpening his skills in the offensive security domain while acting as a web application penetration tester for numerous private and public organizations. He is one of the founders and lead authors of Primal Security Podcast, focusing on creating information aimed at fellow passionate security professionals.

1

Zack Meyers

Zack Meyers (@b3armunch) is a business guy that then became a motivated infosec geek by starting his work as a continuous monitoring vulnerability analyst. Shortly afterward he found an interest in offensive security work and landed his current job as a web application pentester. Today he is always looking to learn about new techniques and tools that can help him identify his next big win towards exploiting a customer’s web server. He is a member of Primal Security and currently holds several security certifications including CISSP, GWAPT, GCIH, etc.

tX,

Lane Huff

Lane Huff (@skankinmonkey) is a security engineer who has been in the field since 2007 and has worked for companies ranging from small 5-person startups to large defense contractors. He got his start doing ROM hacking and translation work in the video game community in the late 90’s and early 2000’s. Currently, Lanes focus is on application security and malware analysis, but has experience in python and bash scripting, incident response, penetration testing, and security compliance auditing. He is an Offensive Security Certified Professional (OSCP) but is especially proud of his CompTIA A+ certification.

Alex - Primal Security

Alexander Cobblah

Alexander Cobblah (r2s) is a senior penetration tester, mentor and rising exploit developer. Cobblah’s remarkable experiences in Biotechnology, Computer Network Defense (CND) and Offensive Security have been used to fortify and secure enterprise Fortune 500, commercial, and government clients around the world. Over the last decade, Cobblah’s hunger for learning has continued to fuel his passion for security and he is ready for what new challenges lie ahead.  Alex is a member of Primal Security focusing on exploit development, and penetration testing tutorials.

Email: alex@primalsecurity.net