zach15james@proton.me · linkedin.com/in/zrjames · github.com/zach15james · gitlab.com/zach15james
I train adversarial reasoning across formal, computational, linguistic, and systems-level domains.
I build production-grade low-level systems and have a peer-reviewed publication in applied ML. Applying to SWE, embedded, RE, defense, and ML roles — open to any position where technical depth matters.
Coursework: malware analysis & reverse engineering · operating systems · computer networks · competitive programming · applied optimization · numerical linear algebra · abstract algebra II · advanced calculus of several variables · mathematical statistics
Static and dynamic analysis of malware, x86 assembly deep-dives, and vulnerability research. The proof-of-work behind the projects above.
Reverse engineering the worm payload via IAT resolution through sqlsort.dll.
Boot sector infection, payload trigger logic, and disk overwrite mechanics.
Disassembly, infection mechanics, and payload analysis of the DOS7 sample.
Scanned handwritten notes for every exercise in xorpd's "little black book".
Selected notes from ongoing reading across philosophy, organizational theory, and literature — a signal of intellectual range, not a reading list. From the Agape Bloom archive.