Experience
Mike Felch started his initial offensive security activity by exploiting BBS backdoors. He began his career in 1997 as a Linux administrator and has held numerous offensive security and full-stack engineering roles since that time. Mike started penetration testing in 2005 and holds an extensive security background in red teaming, hardware hacking, cloud penetration testing, reverse engineering, exploit development, and vulnerability research.
Professional Affiliations:
- Electronic Crimes Task Force
Industry Contributions
Mike frequently speaks at InfoSec conferences, contributes to open-source tooling as well as publications (Tribe of Hackers: Red Team Edition), and is an InfoSec conference organizer and volunteer on an ongoing basis.
Passion for Security
Mike has a passion for identifying new attack paths and weaponizing novel tradecraft. His interest in and enthusiasm for red teaming modern technology stacks like CI/CD pipelines and cloud service providers drive him to continuously explore and develop innovative strategies to enhance security and resilience in these environments.