Brandon Wolfe

Software developer and security hobbyist.


About Me

Who am I?

I'm a recently-graduated masters student from the Information Networking Institute at Carnegie Mellon University. I have a Masters in Information Security with a degree track focus in Cyber Forensics and Incident Response.

Other than that, I also...

  • Graduated summa cum laude with a B.S. in Computer Science from the University of Southern Mississippi.
  • Have worked for the Emerging Technology Center - Software Engineering Institute, the Naval Research Laboratory, and South Mississippi Electric Power Association.

Where am I?

I live in Pittsburgh, Pennsylvania. Prior to that, I lived in Mississippi for 20 years.

Contacting Me

Feel free to connect with me on LinkedIn!

What I do

  • Python
  • C/C++
  • Java
  • Bash scripting
  • Windows
  • Linux
  • Network security
  • Distributed systems
  • Version control (git)
  • Data analytics
  • Wireshark
  • Cyber intelligence
  • Filesystem and network forensics
  • yasm/x86/ARM assembly
  • Intrusion detection systems
  • Android development
  • Information security risk analysis
  • Overlay networks (Tor)

Some projects I've done

Echo -- Distributed Music Player

  • Echo is a distributed music sharing application developed in Scala using the Akka framework.
  • With Echo, you can share your music with your friends and play music at the same time in different locations.

Overlay Networks for Enhanced Computer Network Defense

  • Implemented several network services on virtual network to emulate enterprise network environment
  • Deployed and configured overlay network onto the virtual enterprise network
  • Tested network service access through the overlay network for performance and management capabilities
  • Analyzed test results to hypothesize how the security capabilities of the overlay network affected network service performance

Password Sharing Websites - A Measurement Study

  • Continually measured growth and user activity on 5 different password sharing websites
  • Monitored posting of new accounts and changes to crowd-sourced information
  • Analyzed sharing of credentials among sites, most popular websites posted, largest site growth, and most popular category for posted credentials
  • Posted new accounts for tracking website usage and account hijacking attempts.
  • Documented findings in paper of publishable quality

Information Assurance Exercise

  • Monitored live attacks on virtual network
  • Analyzed network defense alerts to determine cause or source of attacks
  • Performed post-attack analysis to determine areas to harden the virtual network

High Performance Network Communication between Android Tablets and High Frequency Application Servers

Designed server and mobile applications for testing the effects of poor network conditions on NORM protocol. Results were published as part of undergraduate thesis.