Chief Technical Officer at HAWK NETWORK DEFENSE, INC
Midlothian, Texas, United States
Join Prog.AI to see contacts
Join Prog.AI to see contacts
Summary
👤
Senior
🎓
Top School
Tim Shelton is a seasoned technology leader and CTO driving security-focused software and services at HAWK Network Defense, with a focus on SIEM and enterprise incident response. Over 14 years, he has led strategic IT initiatives, co-authored a patent-pending addendum, and steered the development of high-assurance security solutions for gaming and enterprise clients. He combines hands-on software and security engineering with executive leadership, architecting the first version of HAWK’s multi-tenant cloud-based SIEM and directing a focused technology team. A recognized security researcher, he has published numerous vendor vulnerabilities and famously broke out of a VMware guest in 2005, illustrating deep practical expertise in offensive and defensive security. As an active open-source contributor, he has advanced CAPE (Malware Configuration and Payload Extraction) and SigmaHQ's Sigma rule repository, implementing remote sniffing via SSH, anti-debugging/anti-VM techniques, and back-end analytics enhancements. Based in Midlothian, Texas, he translates cutting-edge research into secure, scalable solutions for enterprise customers and strategic partnerships.
15 years of coding experience
4 years of employment as a software developer
Bachelors Management of Information Systems, Bachelors Management of Information Systems at Dallas Baptist University
High School Diploma, High School Diploma at Mansfield High School
Contributions:16 reviews, 290 commits, 142 PRs in 1 year 3 months
Contributions summary:Tim primarily contributed to the development of a back-end system for generating and managing HAWK analytic records within the Sigma rule repository. Their work involved implementing code to translate Sigma rules into a HAWK-specific format, adding features like author and reference information, and updating the JSON record structure. They also integrated with the system to calculate and adjust correlation scores.
Contributions:40 commits, 13 PRs, 41 comments in 5 months
Contributions summary:Tim contributed to the `sniffer.py` module, enhancing its remote sniffing capabilities by adding functionality to run `tcpdump` on a remote host via SSH. They added code to facilitate transferring the pcap file back and stopping the process on the remote machine. Additionally, they introduced and refined numerous anti-debugging and anti-VM checks within the `CAPE` signature module, focusing on techniques such as `SetUnhandledExceptionFilter`, `AddVectoredExceptionHandler`, and analyzing kernel exploit attempts. They also implemented TRiD support and integrated it within the Django UX.
payloadmalwareextractionmalware-analysis
Find and Hire Top DevelopersWe’ve analyzed the programming source code of over 60 million software developers on GitHub and scored them by 50,000 skills. Sign-up on Prog,AI to search for software developers.