Skip to content

Resume

Resume and selected experience

A web version of the resume with direct access to the PDF.

Cameron Babcock

Principal Software Engineer with 10+ years in Windows kernel development, EDR architecture, offensive cyber tooling, vulnerability research, and security platform engineering.

Credentials

  • TS/SCI + FSP last active 2024
  • GSEC
  • Net+
  • GCFA
  • GCFE
  • CISSP
  • GCIH
  • GSTRT
  • GCIA

Selected experience

Principal Software Engineer

Sophos / SecureWorks

2024 - Present

Leading Windows agent and EDR platform work across kernel and user mode, with a focus on exploit-aware telemetry, defensive hardening, and practical platform modernization.

  • Architected enterprise EDR capabilities across kernel and user mode
  • Established AI-assisted workflows and engineering standards across a large legacy codebase
  • Built crash-dump and behavioral-analysis utilities for production defense

Senior CNO Software Engineer

Raytheon Cyber

2022 - 2024

Developed advanced CNO tooling and led research into evasion, anti-analysis, and validation infrastructure across multiple operating systems.

  • Built implants, loaders, and supporting command-and-control infrastructure
  • Researched hypervisor-based and hardware-assisted evasion techniques
  • Introduced automated testing and CI patterns inside constrained environments

Software Engineer / Systems Vulnerability Analyst

National Security Agency

2020 - 2022

Worked across red- and blue-team assessments, supply-chain research, vulnerability analysis, and technical reporting for senior stakeholders.

  • Contributed to work referenced in senior-level cyber policy discussions
  • Researched SolarWinds-class attack paths and defensive replication strategies
  • Performed reverse engineering, application security audits, and tool evaluation