About
Chloe Quinn (She/Her)
Location: Rochester, NY
Focus: Offensive Security • Reverse Engineering • Application Security
Overview
Cybersecurity student with hands-on experience analyzing real-world production systems. I reverse engineer JVM bytecode and native binaries, develop custom tooling for protocol analysis and fuzzing, and research logic flaws in distributed systems. My work emphasizes integrating security throughout the software development lifecycle.
Currently seeking internships and early-career roles in:
- Security Research
- Application Security
- Backend Engineering
Education
B.S. Cybersecurity (2025–2028)
St. John Fisher University
Minor: Psychology
Technical Focus
Reverse Engineering
- JVM bytecode analysis and dynamic instrumentation
- Native binary analysis (C/C++ applications)
- Memory corruption and control flow analysis
Offensive Security
- Protocol analysis and packet manipulation
- Fuzzing infrastructure and custom harnesses
- Logic flaw identification (state desync, validation bypass, timing vulnerabilities)
- Proof-of-concept exploit development
Secure Development
- Security-aware backend systems
- Threat modeling and secure design patterns
- Tooling for automated vulnerability detection
Languages: Java, C/C++, Python
Reverse Engineering: IDA Pro, x64dbg, Ghidra
Network Analysis: Wireshark, Burp Suite
Development: Git, VS Code, JetBrains IDEs
Experience
Security Researcher (Contract)
- Reverse engineered production JVM and native systems to identify security vulnerabilities
- Developed custom tooling for protocol fuzzing and exploit research
- Analyzed logic flaws in distributed systems, including state desynchronization and input validation bypasses
- Produced sanitized proof-of-concept exploits and detailed technical reports
Software Developer
- Built and maintained backend systems serving real users in production environments
- Translated operational requirements into secure, maintainable code
- Collaborated with cross-functional teams to deliver user-facing features
Interested in discussing security research, application security, or backend engineering opportunities.