Anwer Gertani
Anwer Gertani

Anwer Gertani

The security leader who still opens binaries.

Washington, DC

Over the past decade I’ve reverse-engineered hundreds of malware samples — APT implants, banking trojans, custom packers — and used what I learned to change security architectures, brief executives, and build detection capabilities that outlasted the original threat. That technical grounding is what most CISOs lose on the way up. I kept it deliberately, and it changes every decision I make.

When I’m in a vendor evaluation I can open the product in a sandboxed environment and verify whether it actually catches what I’m seeing in the wild. When a novel EDR-evasion technique surfaces in a Tuesday sample, I can turn it into a board-level risk conversation by Thursday — not by dumbing it down, but by finding the governance decision hiding inside the technical finding.

The work I’m most proud of isn’t any single malware find. It’s the follow-the-sun team of six that now handles novel threats, runs IR engagements, and ships production tooling without me in the room. Building toward your own irrelevance is the job.

My Journey

  1. 2021

    Present

    Malware Reverse Engineering Manager — Incident Response & Threat Intelligence

    Deloitte · Arlington, VA

    Lead a team of six malware reverse engineers, developers, and cloud architects on a follow-the-sun model handling malware incidents and active malware analysis for the global cyber defense team and external clients.

    500K+

    assets protected

  2. 2019

    2021

    Senior Malware Reverse Engineer — Incident Response & Threat Intelligence

    Deloitte · Arlington, VA

    Drove threat intelligence and deep malware reverse engineering for APT campaigns, building the tooling and analysis environments that scaled the team’s output.

  3. 2018

    2019

    Incident Response Lead & Senior Cyber Threat Analyst

    College Board · Reston, VA

    Led incident response and senior threat analysis for the College Board security organization.

  4. 2015

    2018

    SOC Analyst & SOC Lead — Tiers 1–3 (progressive roles)

    KFH Bank — Global Security Operations Center · Kuwait

    Progressed through Tier 1–3 SOC roles and into SOC lead at a global bank SOC, handling detection, triage, and incident response across the enterprise.

Continuous practice

  • CISSP (ISC)² · #02743155
  • SSCP (ISC)² · #581892
  • SANS SEC595 — Applied Data Science & Machine Learning for Cybersecurity (SANS Institute, 2024)
  • Hex-Rays IDA Pro Advanced Decompiler Training (Hex-Rays, 2024)
  • Hex-Rays IDA Pro Advanced Malware Techniques (Hex-Rays, 2025)
  • Hex-Rays IDA Pro Advanced Programming & C++ Extensions (Hex-Rays, 2024)
  • Binary Literacy for Static Reverse Engineering (Mobius Strip Reverse Engineering, 2023)
  • SMT-Based Binary Program Analysis (Mobius Strip Reverse Engineering, 2023)
  • Advanced Windows Kernel Rootkit Techniques (Black Hat Las Vegas, 2020)
  • Windows Internals — Zero Ring Training (Las Vegas, 2021)

Academic foundation

  • Master of Business Administration (MBA), Management

    University of Wollongong · NSW, Australia

    2014

  • Bachelor of Business Administration (BBA), Commerce

    University of Wollongong · Dubai, UAE

    2012

Clearance

No clearance — eligible

From the Desk

Writing & notes

View all writing
  1. April 21, 2026

    Notes on Byte-Transformer Models for Detecting EDR-Evading Malware

    How we trained an in-memory detection agent on raw bytes — and what surprised us about generalization to unseen packers.

    • AI / ML
    • Malware Analysis
    • EDR
  2. February 10, 2026

    Building a Follow-the-Sun Reverse Engineering Team

    What I learned building a global RE team that hands off live malware incidents across three time zones — and the parts I’d do differently.

    • Leadership
    • Incident Response
    • Threat Intel
  3. November 7, 2025

    What the C-Suite Actually Wants to Hear About Ransomware

    After dozens of executive briefings during active incidents, three things matter — and threat intelligence is usually not one of them.

    • Executive Communication
    • Incident Response
    • Risk