Todd Bell

Principal Reverse Engineer at SonicWall

Todd Bell has a diverse and extensive work experience in the field of cybersecurity. Todd has held various roles in different companies, starting with their current position as Principal Reverse Engineer at SonicWall Inc. Here, they are responsible for engineering new solutions, products, tools, and processes for malware and network analysis using machine learning models, as well as reverse engineering new exploits and malware related to espionage.

Prior to their current role, Todd worked as a (SRT) Pentester, Reverse Engineer, and Security Researcher at Synack Red Team. In this role, they contributed to vulnerability intelligence for enterprise clients through software development, vulnerability research, exploit development, and reverse engineering techniques.

Before that, Todd served as a Principal Reverse Engineer at Cyphort Inc, where they designed and implemented the Adaptive Detection Fabric and refactored software to use Suricata, Yara, Snort Rules, and PostgreSQL database schemas/metrics.

Todd also worked as a Principal Reverse Engineer at Norse Corporation, leading a team in overseeing and managing operations for clients in the Middle East. Todd conducted dynamic and static analysis of suspicious code, classified malware, and analyzed bot behavior.

Todd's experience also includes working as a Senior Security Researcher at McAfee Labs, where they refactored legacy code, improved the performance of core engine systems, and reverse engineered various types of challenging algorithms and malware.

Additionally, Todd has experience as a Malware Researcher & Low Level Systems Engineer at (WTCG), where they analyzed malware through postmortem analysis and identified anti-forensic techniques.

Todd also worked as a Malware & Exploit Researcher - Fraud Analyst at IID, where they provided anti-phishing and brand security solutions for financial service firms.

Finally, Todd started their career in the United States Air Force as a 2A331X Avionics System Apprentice specializing in Attack Control. Todd gained experience in identifying and isolating avionics system malfunctions in F-22 and F-15 aircraft.

Overall, Todd Bell's work experience spans reverse engineering, malware analysis, vulnerability research, exploit development, and avionics systems.

Todd Bell attended DeVry University from 2010 to 2014, where they obtained a Bachelor's degree in Computer Engineering. Todd'sspecific field of study is not mentioned. Additionally, Todd Bell received certifications in Basic Military Training, Electronic Principles, and F - 15 (MRA) Avionic Attack Control Systems. The specific institutions and dates of attainment for these certifications are not provided. It is also mentioned that they attended the USAF Air University - Community College of the Air Force, although the duration and specific degree or field of study are not specified.

Links

Previous companies

Norse Corporation logo
U.S. Air Force logo
IntruVert logo

Timeline

  • Principal Reverse Engineer

    June, 2018 - present