Security engineer focused on understanding attacker behavior, reverse engineering complex systems, and turning findings into resilient detections, safer auth flows, and practical defensive tooling.
Security Arsenal
Declassified case studies from the frontlines of anti-bot bypass research. Demonstrating expertise in reverse engineering and obfuscation analysis.
Imperva Incapsula Bypass
Analyzed Imperva's reese84 cookie generation by reconstructing their entire client-side validation flow from obfuscated code to understand its weaknesses and improve detection.
PerimeterX Deobfuscator
Built a deobfuscator for PerimeterX's heavily protected JavaScript that reveals their behavioral tracking and WASM integration to evaluate defensive robustness.
Who is Watching?
Every website creates a unique profile of your device. See exactly what trackers see when you browse.
Ready to Scan
Click to analyze your browser's unique fingerprint and generate a bot trust score.
Hi, I'm Jay
Security-minded software engineer with experience reverse engineering complex web/mobile behaviors, analyzing auth and session flows, and building tools to surface risky or anomalous behavior. Strong in ambiguity, cross-functional debugging, and translating attacker understanding into practical defensive improvements.
Berea, Ohio
remote-first
IDA Pro, Ghidra, Burp
reverse engineering
JS, Python, Go
full-stack development
Anti-Bot & RE
security researcher
"Don't worry about failure; you only have to be right once."— Drew Houston, CEO of Dropbox
Security Research
Areas of expertise in offensive security and reverse engineering
Web Application Security
Identifying and exploiting vulnerabilities in modern web apps, from XSS to authentication bypasses.
Bot Detection & Evasion
Reverse engineering anti-bot systems like PerimeterX, DataDome, and custom fingerprinting solutions.
Reverse Engineering
Analyzing obfuscated JavaScript, compiled binaries, and encrypted protocols to understand hidden functionality.
API Security Testing
Finding and exploiting API vulnerabilities, from broken authentication to excessive data exposure.
My Skills
Technologies and tools I use to bring ideas to life
Tools & Platforms
Bot Detection Bypassed
Languages
Fingerprinting
Tools & Technologies
Continuous Research
Security evolves constantly as new detection methods emerge. I actively research the latest bot detection systems, analyze new obfuscation techniques, and develop novel bypass methods.
My Experience
A timeline of my professional journey and education
Software Engineer (Security & Auth)
MaxRewards
- Investigated authentication, session, and cookie behavior across web and mobile flows to identify hidden failure modes and suspicious edge cases
- Instrumented client-server interactions to isolate anomalous login, MFA, and session lifecycle behavior
- Built tooling and scripts to analyze request/response patterns and troubleshoot high-friction security-sensitive workflows
- Partnered across frontend, backend, and mobile surfaces to improve reliability and reduce fragile auth-state handling
- Used reverse engineering and protocol analysis to understand opaque third-party behavior and translate findings into safer implementations
Software Engineer
Metrosmoke
Shopify-backed POS & warehouse flow, built for real-time ops. The challenge? Price & inventory updates lagged and paper pick-lists caused errors during rush hours. I rebuilt the product sync around Shopify's APIs, designed a lightweight picking UI, and containerized everything with one-click deploys. Now releases happen whenever we need them, updates feel instant at the register, and picking accuracy has noticeably improved. Docker + Git-based CI/CD means rollbacks take minutes, not hours.
Network Engineer
Oxheberg LLC
Kept a small KVM fleet stable under pressure. When spiky traffic led to resource contention and crypto-mining attempts started appearing, I stepped up to tune the KVM hosts and harden our iptables rules. Built DDoS-resistant firewall policies with traffic shaping, created playbooks for incident response, and set up monitoring to catch anomalies early. The result? Fewer incidents, faster remediation, and predictable performance for production workloads.
B.S. in Computer Science (Cybersecurity Focus)
Ohio State University
Pursuing a rigorous curriculum in computer science and cybersecurity. My academic work focuses on data structures, algorithmic efficiency, and foundational systems knowledge, which directly inform my approach to building resilient tools and analyzing complex security systems.