Jeremy Brown helped Trinity Cyber develop counter maneuvers for a DNS exploit requiring deep parsing of a certain kind of traffic, deploying it to all clients in less than two days.
Jeremy Brown serves as vice president of threat analysis at Trinity Cyber, a team of threat analysts who hunt, analyze, and develop countermeasures from scratch for malware and exploits found in the wild.
Everything he and his team work on is based on next-generation innovation developed from scratch to give the defender an advantage. They developed a powerful new approach to intrusion prevention system as-a-service, delivered through a service edge architecture and patent-pending technology. Brown’s team also developed counter maneuvers for SigRed, a DNS exploit requiring deep parsing of a certain kind of traffic, then deployed to all clients in less than two days.
Brown has designed repeatable processes for threat hunting, malware analysis, countermeasure development, and reporting. He challenges everyone to break old habits of relying solely on the tools they have and encourages them to explore new capabilities and request tool acquisition. Brown speaks frequently at university classes – such as the malware reverse engineering program at Columbia University – to inspire students, showing them novel techniques for preventing malware communications. In late 2020, Brown spoke at a VirusTotal community series to help vendors and clients understand how threat hunting can be applied to the left of a breach to reduce the risk of exploitation to the company.
“Jeremy Brown aims to keep Trinity on the cutting edge of threat prevention and that clients receive top-notch threat protection they can trust,” the company said in its entry. “Throughout 2020, Brown delivered more than 200 customer presentations demonstrating common threats that penetrate networks, sharing how the exploit works around common controls, and then how Trinity detects and stops the attack from breaching network defenses.”