CLASSIFIED RESEARCH

Security Arsenal

Declassified case studies from the frontlines of anti-bot bypass research. Demonstrating expertise in reverse engineering and obfuscation analysis.

Advanced Bot Detection

Imperva Incapsula Bypass

Analyzed Imperva's reese84 cookie generation by reconstructing their entire client-side validation flow from obfuscated code to understand its weaknesses and improve detection.

Babel AST parsingJSDOM environmentTLS spoofing+1 more
View Analysis
JavaScript Deobfuscation

PerimeterX Deobfuscator

Built a deobfuscator for PerimeterX's heavily protected JavaScript that reveals their behavioral tracking and WASM integration to evaluate defensive robustness.

AST transformationControl flow analysisString decryption+1 more
View Analysis
LIVE BROWSER FINGERPRINTING

Who is Watching?

Every website creates a unique profile of your device. See exactly what trackers see when you browse.

Ready to Scan

Click to analyze your browser's unique fingerprint and generate a bot trust score.

Jay - Security Researcher

Hi, I'm Jay

Security-minded Software Engineer • Detection Engineer

Security-minded software engineer with experience reverse engineering complex web/mobile behaviors, analyzing auth and session flows, and building tools to surface risky or anomalous behavior. Strong in ambiguity, cross-functional debugging, and translating attacker understanding into practical defensive improvements.

Location

Berea, Ohio

remote-first

Tools

IDA Pro, Ghidra, Burp

reverse engineering

Languages

JS, Python, Go

full-stack development

Focus

Anti-Bot & RE

security researcher

"Don't worry about failure; you only have to be right once."
— Drew Houston, CEO of Dropbox

Security Research

Areas of expertise in offensive security and reverse engineering

Web Application Security

Identifying and exploiting vulnerabilities in modern web apps, from XSS to authentication bypasses.

OWASP Top 10Burp SuiteAPI TestingJWT Attacks

Bot Detection & Evasion

Reverse engineering anti-bot systems like PerimeterX, DataDome, and custom fingerprinting solutions.

JS DeobfuscationTLS FingerprintingBrowser AutomationSensor Data Spoofing

Reverse Engineering

Analyzing obfuscated JavaScript, compiled binaries, and encrypted protocols to understand hidden functionality.

IDA ProGhidraDevToolsAST Analysis

API Security Testing

Finding and exploiting API vulnerabilities, from broken authentication to excessive data exposure.

GraphQL InjectionRate Limiting BypassIDORAPI Fuzzing

My Skills

Technologies and tools I use to bring ideas to life

Expert
Proficient
Learning

Tools & Platforms

Chrome DevTools
Expert
Burp Suite
Expert
Frida
Learning
Ghidra
Learning

Bot Detection Bypassed

Imperva/Incapsula
Expert
PerimeterX
Learning

Languages

JavaScript/TypeScript
Expert
Go
Learning

Fingerprinting

Canvas Fingerprinting
Expert
WebGL Analysis
Expert
Audio Context
Expert
TLS/JA3
Expert

Tools & Technologies

Burp Suite
Wireshark
Git
Docker

Continuous Research

Security evolves constantly as new detection methods emerge. I actively research the latest bot detection systems, analyze new obfuscation techniques, and develop novel bypass methods.

JavaScript DeobfuscationTLS FingerprintingBrowser AutomationCaptcha SolvingRequest Forgery

My Experience

A timeline of my professional journey and education

Work Experience

Software Engineer (Security & Auth)

MaxRewards

2026 - Present
Remote
  • Investigated authentication, session, and cookie behavior across web and mobile flows to identify hidden failure modes and suspicious edge cases
  • Instrumented client-server interactions to isolate anomalous login, MFA, and session lifecycle behavior
  • Built tooling and scripts to analyze request/response patterns and troubleshoot high-friction security-sensitive workflows
  • Partnered across frontend, backend, and mobile surfaces to improve reliability and reduce fragile auth-state handling
  • Used reverse engineering and protocol analysis to understand opaque third-party behavior and translate findings into safer implementations
Reverse EngineeringAuth FlowsSession AnalysisPythonWeb/Mobile Debugging
Work Experience

Software Engineer

Metrosmoke

06/2024 - 12/2025
Brookpark, OH

Shopify-backed POS & warehouse flow, built for real-time ops. The challenge? Price & inventory updates lagged and paper pick-lists caused errors during rush hours. I rebuilt the product sync around Shopify's APIs, designed a lightweight picking UI, and containerized everything with one-click deploys. Now releases happen whenever we need them, updates feel instant at the register, and picking accuracy has noticeably improved. Docker + Git-based CI/CD means rollbacks take minutes, not hours.

ReactNode.jsShopify APIsDockerGitCI/CD
Work Experience

Network Engineer

Oxheberg LLC

01/2023 - 06/2024
Remote

Kept a small KVM fleet stable under pressure. When spiky traffic led to resource contention and crypto-mining attempts started appearing, I stepped up to tune the KVM hosts and harden our iptables rules. Built DDoS-resistant firewall policies with traffic shaping, created playbooks for incident response, and set up monitoring to catch anomalies early. The result? Fewer incidents, faster remediation, and predictable performance for production workloads.

KVMLinuxiptablesNetwork SecurityDDoS Mitigation
Education

B.S. in Computer Science (Cybersecurity Focus)

Ohio State University

Expected 06/2027
Columbus, OH

Pursuing a rigorous curriculum in computer science and cybersecurity. My academic work focuses on data structures, algorithmic efficiency, and foundational systems knowledge, which directly inform my approach to building resilient tools and analyzing complex security systems.

CybersecuritySoftware EngineeringData StructuresAlgorithms

Get In Touch

Send a Message