Stephen McCarthy

Stephen McCarthy

Emerging Technologies Researcher

cryptonautics

Biography

An emerging technologies researcher, Stephen McCarthy architects and implements proof-of-concept software systems that explore creative possibilities in artificial intelligence and cybersecurity. His research interests currently include:

  • Generative artificial intelligence (GenAI)
  • Large language models (LLMs)
  • Large language model operations (LLMOps)
  • Semantic understanding and sythesis of audio, image, and video
  • AI agents
  • AI safety and alignment
  • Adversarial machine learning (ML)
  • AI red teaming

He was previously a software engineer at Enveil where he built privacy-enhancing technologies (PETs). He focused on the development of distributed systems that leverage fully homomorphic encryption (FHE) to protect data in use, enabling secure data collaboration and encrypted inference capabilities wihin mission-critical applications.

Interests
  • Cybersecurity
  • Artificial Intelligence
  • Blockchain
  • Gaming
Education
  • BSc in Computer Science

    University of Maryland, College Park

Experience

 
 
 
 
 
Emerging Technologies Researcher
July 2023 – Present Washington DC-Baltimore Area
Researches emerging technologies with a focus on cybersecurity and machine learning, to include: generative ML, large language models, speech and image recognition, AI safety and alignment, adversarial ML, distributed and resilient malware, cryptovirology, and AI agenticity. Creative problem solver who architects and implements prototype system and software solutions exploring the intersection of novel technology topics with a focus on proof-of-concept implementations.
 
 
 
 
 
Enveil
Software Engineer
Enveil
August 2022 – May 2023 Fulton, MD
Built privacy-enhancing technologies. Implemented algorithms for secure data processing on distributed systems using fully homomorphic encryption and privacy-preserving computation.
 
 
 
 
 
Smartlink Group
Red Team Analyst
Smartlink Group
February 2020 – August 2022 Washington, D.C.
Performed red team operations in support of US Courts. Creative white-hat hacker who attacked the digital infrastructure of the federal judiciary to assess and improve its resilience against real-world adversaries. Researched the application of emerging technologies such as blockchain and machine learning to enable novel information security software solutions and analysis.
 
 
 
 
 
Emerging Technologies Researcher
January 2017 – January 2020 Washington DC-Baltimore Area
Researched emerging technologies with a focus on blockchain and digital ledger technologies, cybersecurity, machine learning, and data science. Creative problem solver who architected and implemented novel prototype software solutions and strategies.
 
 
 
 
 
TrustedSec
Senior Security Consultant
TrustedSec
June 2016 – December 2016 Remote (Washington DC-Baltimore Area)
Executed and managed network penetration tests, web application security assessments, mobile application security assessments, source code analyses, red team exercises, social engineering assessments, and wireless penetration tests. Performed in-house security research and tool development.
 
 
 
 
 
Mandiant (Google Cloud)
Consultant
Mandiant (Google Cloud)
October 2014 – March 2016 Alexandria, VA
Managed small teams as a technical lead for penetration tests and other engagements within Mandiant’s proactive service line. Delivered black-box red team assessments that simulated attacks from advanced persistent threat (APT) actors. Designed, implemented, and managed functional-level projects that supported all Mandiant consultants in executing proactive security assessments.
 
 
 
 
 
Mandiant (Google Cloud)
Associate Consultant
Mandiant (Google Cloud)
January 2013 – September 2014 Alexandria, VA
Performed network penetration tests, web application security assessments, mobile application security assessments, wireless security audits, social engineering tests, incident response investigations, and dead-drive forensics. Drafted, reviewed, and finalized written reports and delivered oral presentations.
 
 
 
 
 
Booz Allen Hamilton
Intern Research Assistant
Booz Allen Hamilton
June 2011 – August 2011 Linthicum, MD
Performed a team-based penetration test across the entire Booz Allen Hamilton enterprise. Discovered, exploited, and documented system- and web-based security vulnerabilities for remediation. Designed and developed software for Internet disruption detection and analysis.
 
 
 
 
 
Johns Hopkins University Applied Physics Lab
Applications System Programmer
Johns Hopkins University Applied Physics Lab
June 2003 – August 2006 Laurel, MD
Developed and tested image processing algorithms for autonomous ballistic missile targeting and guidance. Designed and implemented volumetric calibration software for a low-Tesla MRI to detect osteoporosis due to weightlessness.

Projects

*
Example Project
An example of using the in-built project page.
Example Project
External Project
An example of linking directly to an external project website using external_link.
External Project

Contact

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam mi diam, venenatis ut magna et, vehicula efficitur enim.