Matthew J. Edman, PhD, is a computer scientist who specializes in cyber security and investigations. His areas of expertise include network security; penetration testing, and vulnerability assessments; secure software development and source code audits; and software analysis, reverse engineering, and exploitation. He also provides expert testimony on matters related to information and network security.
Dr. Edman previously worked as a lead cyber-security engineer for a federally funded research and development center, where he provided specialized computer network security research and development to federal law enforcement on a number of cases. He has been recognized within law enforcement and the United States Intelligence Community as a subject-matter expert on cyber investigations related to anonymous communication systems, such as Tor, and virtual currencies like Bitcoin. As part of his work, he assembled and led an interdisciplinary team of researchers that developed a state-of-the-art network-investigative technique that was successfully deployed and provided critical intelligence in multiple high-profile law enforcement cyber investigations.
Before joining BRG, Dr. Edman also worked as a senior vulnerability engineer for a global financial services, software, and media company based in New York. As a member of the firm’s Vulnerability Analysis Team, his work focused on cyber security and the protection of sensitive client data from both internal and external threats through continuous vulnerability research and penetration testing of the firm’s network infrastructure, websites, software, and mobile applications. He was also involved in software and network architecture design reviews and risk assessments for numerous business areas across the company.
Dr. Edman has an MS and PhD in computer science from Rensselaer Polytechnic Institute, where his research areas included novel techniques for cryptographic security and authentication in wireless networks, and the design, implementation, and analysis of anonymous communication systems on the Internet. He has published scientific articles in peer-reviewed conferences and journals, and has served as an invited program committee member for the ACM Conference on Computer and Communications Security and the IFCA International Conference on Financial Cryptography and Data Security. He has also served as an external reviewer for several academic conferences and journals, including IET Information Security and the Privacy Enhancing Technologies Symposium.
Rensselaer Polytechnic Institute
PhD, Computer Science, 2011
MS, Computer Science, 2007
BS, Computer Science, 2005
2014 - 2015
Senior vulnerability engineer
2013 - 2014
The MITRE Corporation
Lead cyber security engineer
2009 - 2013
Jack Hollingsworth Award, Rensselaer Polytechnic Institute, 2007
Our dedicated experts have responded to and investigated over 600 cyber attacks against organizations across a range of industries both in government service and in private practice.
News & Insights
- IEEE Transactions on Information Forensics and Security 11:8May 13, 2016
News & Commentary
- New York PostApril 20, 2016
Association for Computing Machinery (ACM), Member
Institute of Electrical and Electronics Engineers (IEEE), Member
International Association for Cryptologic Research (IACR), Member
New Jersey Institute of Technology, Cyber Security & Privacy Industry Advisory Board
Madison Square Park Conservancy
Member, associate board