Carolyn Ahlers

Reverse Engineer | IPSecure, Inc

Carolyn has been a malware reverse engineer for over nine years. She initially gained her reverse-engineering skill set in the US Navy, conducting malware analysis for defensive purposes, incident response and enabling exploitation operations. She is proficient at analyzing various types of binaries and working with many malware analysis tools and programming languages such as x86 assembly, C, C++ and Python. She also has three years’ experience as a computer forensic analyst conducting analysis on various media devices in search of malicious intrusions.

Carolyn has taken numerous malware reverse-engineering courses, at levels from beginner to advanced. She has also created numerous malware analysis training pipelines. She has her Bachelor of Science degree in computer networks and cybersecurity from the University of Maryland Global Campus, and has been SANS GIAC Reverse Engineering Malware (GREM)-certified since 2015.

Carolyn Ahlers