Mark E. Haase
Washington, DC
Cyber + AI Lead Engineer
A detail-oriented problem solver with a passion for security and engineering that goes beyond just a career. Adept at communicating technical subjects to non-technical audiences. Ardent advocate for ethics and social good in technology.
Experience
MITRE, McLean, VA 2021 – Present
A non-profit R&D organization with a mission committed to the public good.
Chief Engineer, Center for Threat-Informed Defense
- Lead technical strategy and technical quality for the Center for Threat-Informed Defense, a privately funded research and development center.
- Implement process automation (Jira and AppSmith) to reduce overhead, bring data to the right place at the right time, and enable self-serve data viz (Apache Superset), enabling us to scale our business.
- Promote threat-informed defense via conference talks and workshops at RSA, FIRST, and CARO.
Lead Offensive Cybersecurity Engineer
- Tech lead for the open source Attack Flow standard for describing cyber incidents using directed acylic graphs (DAGs).
- Senior software engineer for DOJ cyber forensics project.
Microsoft, Reston, VA 2020 – 2021
Air-gapped instantiation of an M365 productivity cloud.
Software Engineer
- Reliability engineering for M365 cloud.
- Lead developer for log scrubbing system to implement data handling standard.
Hyperion Gray LLC, Remote Contractor 2015 – 2020
A small business that works on DARPA R&D contracts and penetration testing.
Sr. Software Engineer
- Lead engineer on crawling & scraping application built in Dart, Angular, and Python. Wireframed in 8 weeks and delivered prototype in 24 weeks. Deployed pilots to government partners and production-ready within 1 year.
- Lead engineer on headless browsing system with a de novo Python implementation of Chrome DevTools Protocol (CDP). Production-ready within 6 months.
- Published Dark Web Map, an interactive visualization of the dark web that received 100k hits and was featured on forbes.com, vice.com, and cnbc.com.
- Developed CAPTCHA solving library that uses OpenCV and Keras to build convolutional neural networks (CNNs) that can solve CAPTCHA tests for some popular software such as WordPress and phpBB. Deployed using TensorFlow Lite models inside AWS Lambda with API Gateway.
Penetration Tester
- Senior penetration tester on multinational law firm engagement and several tech startups for web application and network pen tests.
- Discovered 0-day local privilege escalation (LPE) in Liquidware Labs ProfileUnity and wrote a working proof-of-concept.
- Published proof-of-concept exploits for several vulnerabilities such as CVE-2019-6111/CVE-2019-6110 and CVE-2018-11235.
Lunarline Inc., Arlington, VA 2012 – 2014
A cybersecurity consulting, training, and products company.
Director of Product Development
- Launched a new product for Lunarline in the first 3 months of employment.
- Overhauled the software development process, including tools, documentation, mandatory code review, and continuous integration.
- Oversaw project management, engineering, and quality control for 5 proprietary products as well as the corporate website.
- Participated in several penetration tests, including a medical records company and a UAV company. Discovered an exploitable shell injection vulnerability in the UAV software.
- Participated in secure code review for a client, including multiple static analyzers (FindBugs, RATS, and Klocwork) and manual code review.
- Used Peach fuzzer to analyze proprietary routing protocol for a client.
Hidden Layer LLC, Washington, DC 2012 - 2012
A small business formed to perform advanced research in the field of software verification.
Co-founder
- Principal author and editor of a DARPA research proposal.
- Wrote a prototype static analyzer using a Naïve Bayes bag-of-words classifier and various n-grams and smoothing techniques, achieving recall rates over 80%.
- Administrative POC, project manager, and technical writer for the 4-month research project, meeting all milestones in the statement of work and receiving positive reviews from our DARPA sponsor.
Endeavor Systems Inc., McLean, VA 2008 - 2012
A boutique consulting firm specializing in federal government cybersecurity and compliance.
Software Team Lead
- Grew revenues from $50k to $500k on flagship product over 3 years.
- Overhauled the software development process, including tools, documentation, mandatory code review, and continuous integration.
- Created a comprehensive hiring process for screening and interviewing software engineers.
Hewlett-Packard Company, Herndon, VA 2006 - 2008
Business Intelligence Consultant
- Designed and implemented extract-transform-load (ETL) applications for interfacing modern platforms to legacy systems at Fannie Mae using Ab Initio and Oracle PL/SQL.
Public Speaking & Training
Threat Intelligence with Attack Flow 2024
CARO Conference, Arlington VA
- Describe how to visualize and encode threat intelligence using the open source MITRE product, Attack Flow.
Threat-Informed Defense Workshop 2023
FIRST Conference, Montreal CA
- A full-day workshop for conference attendees.
- Describe theory and practice of threat-informed defense using hands-on exercise and open-source MITRE projects.
Dark Web Investigations 2017, 2018
NW Regional ICAC Conference, and National LE Training on Child Exploitation.
- A 90-minute dark web primer for law enforcement professionals who specialize in counter-child-exploitation.
- Discussion of dark web technologies Freenet, I2P, and Tor, and the ramifications for traditional digital crime investigative techniques.
- Hands-on labs for officers to gain first-hand experience with dark web tools and OSINT methods.
Securing Web Applications 2014, 2015
Peterson AFB, Scott AFB, Dept. of Transportation
- Developed and presented this class in both 1-day and 4-day formats covering web application vulnerabilities and exploitation, including lecture, slides, hands-on labs, and assessment.
Web Technologies & Security 2014
NASA Goddard Space Flight Center
- Developed and presented this 1-day course covering basic web technologies, the OWASP Top 10, and how to mitigate security vulnerabilities through the software development lifecycle.
A Machine Learning Approach to Software Vulnerability Detection 2013
NYU-Poly THREADS Conference
- Presented details of DARPA research, including background and overview of natural language processing (NLP) and machine learning (ML) classifiers used.
- Presented quantitative results of our research including explanation of the metric used including precision, recall, and F-score.
Reverse Engineering “Secure” SSL APIs 2012
AppSec USA Austin, TX
- Conducted an educational overview of SSL/TLS and how it should be used when building a web API.
- Constructed proof-of-concept iOS game and “secure” high score server to demonstrate weaknesses and possible mitigations.
Education
University of California, Berkeley 2022-2024
Master of Information and Data Science
- Capstone project titled “Just.Ethel: Decompiling Software With Neural Machine Translation (NMT)” using large language models (LLMs) to decompile x86 assembly code to C source code.
- Course work in statistics, data visualization, machine learning at scale, NLP, data science ethics, etc.
University of Pennsylvania 2001-2005
B.A. with Distinction in Philosophy, Politics & Economics.
- Minor in Computer Science & Engineering (30 hours in computer science, math, and statistics).
- Honors Thesis titled, “A Survey In Network Economics.”
Certifications
Offensive Security Certified Professional (OSCP) 2016
Over 200 hundred hours of lab work exploiting 46 machines in the OSCP training environment. The final exam is a hands-on penetration test with 5 targets and a 24-hour time limit.
Certified Ethical Hacker (CEH) – Lapsed 2013
Certified Information Systems Security Professional (CISSP) – Lapsed 2012
Other
- Volunteer teacher with TEALS 2011-2015.
- Created 10 reverse engineering challenge problems for PicoCTF 2019.
- Author of Python Enhancement Proposal PEP-505.
- 26k reputation on Stack Overflow.
- Multiple 0-day discovered, including CVE-2019-2413.
- Published multiple open source projects.