Topher is currently a Senior Principal Offensive Security Engineer (Vulnerability Enthusiast) and is the technical lead for a Fortune 100 Red Team. Topher primiarly enjoys causing constructive mischief. Coming from an offensive security background, he has a research emphasis on reverse engineering, malware, exploitation development, and live memory hacking. He has spoken at various security conferences including DEF CON, SecTor, CanSecWest, ToorCamp and BSides PDX, to name a few. Some of his presentations can be found on Speaker Deck and his CV is here.

He holds a bachelors in Computer Science with an emphasis in Security and Information Assurance from Southern Oregon University. Graduating Summa Cum Laude, Topher instructed courses on malware analysis and memory forensics while also managing the SOU cybersecurity research lab. Mainly focusing on .NET memory hijacking during his studies at university, he has produced tools that allow for new post exploitation attack sequences.

Topher currently holds the following professional certifications:

Topher is also an active contributor to the community and ran the BsidesPDX CTF from 2016 to 2018. He also helped to create a CTF framework that was used for BSidesPDX and it is found at https://github.com/BSidesPDX/bsides-ctf-framework.

Outside of working on research or course material Topher enjoys hiking, mountain biking, playing guitar and discovering new music.