Kevin Landry
Cybersecurity engineer, forensic researcher, and independent security practitioner.
I'm a U.S. Coast Guard veteran with prior Top Secret COMSEC/EKMS access, currently finishing an M.S. in Digital Forensics at George Mason University with a concentration in Malware Reverse Engineering and Penetration Testing. My undergraduate degree is a B.S. in Computer Science with a cybersecurity focus from the University of Mary Washington, graduated Cum Laude.
The work I care about sits at the intersection of offense and defense: understanding exactly how systems fail so that detection and response can be built against real behavior, not theoretical models. I've competed nationally at the USCC Cyber Bowl (2nd place, East division), served as a Teaching Assistant for USCC Cyber Camp, and mentored over 100 students in mobile forensics, malware analysis, and red/blue tooling.
I take on focused engagements where practitioner-level knowledge matters: penetration testing, deception architecture, detection engineering, and forensic analysis. I don't subcontract or pad scope. Every engagement is done directly.
U.S. Coast Guard
Veteran. Former EKMS Manager with Top Secret COMSEC access. Signals and communications background.
George Mason University
M.S. Digital Forensics — Malware Reverse Engineering & Penetration Testing concentration. Expected May 2026.
USCC Teaching Assistant
Invited back as TA for USCC West. Mentored 100+ students in mobile forensics, malware analysis, and CTF tooling.
AI / LLM Evaluation
Technical assessment work for Snorkel AI and Handshake AI. Red teaming and evaluation methodology for language models.