Christopher’s expertise spans various areas of cybersecurity. His technical experience includes custom software development in user, kernel, and hypervisor components, such as the development of a custom Rust OS for Arm64 and x86-64 used for hypervisor vulnerability research, and maintained as an internal tool utilized by other teams. He has also led multiple long-term vulnerability research campaigns, discovering zero-day vulnerabilities across platforms such as Android, iOS, and Windows, including various hypervisor implementations.
Throughout Christopher’s career, he has successfully executed red team engagements against critical infrastructure systems and large organizations, including air-traffic control systems, autonomous train networks, multinational banks, telcos, and more. He has collaborated with teams to address both technical and business aspects of security, enabling him to develop a comprehensive understanding of the offensive security landscape and the unique challenges associated with large corporate environments or government agencies.
In his role as an instructor and course developer at Signal Labs, Christopher’s goal is to help you build confidence, extend your skills, and leverage his experience and knowledge to support your learning and development in advanced offensive security topics.