Skip to content
Cameron Babcock Cameron Babcock
Cameron Babcock

Resume & Experience

Cameron Babcock

Staff software engineer with more than a decade of experience across Windows kernel development, endpoint detection, CNO tooling, malware development, vulnerability research, and agentic AI workflows.

Professional Experience

Staff Engineer

IRU

2025 - Present

Leading the development of a greenfield EDR product, focusing on the Windows Agent and Driver components.

  • Architecting a greenfield Windows kernel-mode telemetry driver designed for low-overhead endpoint visibility at production scale.
  • Developing the user-mode agent component in modern C++ for resilient threat detection.
  • Implementing agentic AI workflows to accelerate driver validation and EDR feature development.
  • Establishing foundational engineering and testing paradigms for the new platform.

Founder / Software Engineer

Real American Security

2022 - Present

Independent consultancy and product development focusing on DoD consulting, C++ obfuscation research (ObfTypes), and building a scalable video game analytics platform.

  • Built production backend APIs and data-intensive web services in Python and .NET for analytics-driven applications.
  • Designed scalable data infrastructure with ClickHouse, Redis, and PostgreSQL to support high-volume ingestion, low-latency access, and large-scale analytical querying.
  • Developed data pipelines and backend workflows powering user-facing analytics and application features, with end-to-end ownership across architecture, implementation, deployment, and iteration.

Principal Software Engineer

Sophos / SecureWorks

2024 - 2026

Leading Windows agent and EDR platform work across kernel and user mode, with a focus on exploit-aware telemetry, defensive hardening, and practical platform modernization.

  • Architected enterprise EDR capabilities across kernel and user mode
  • Established AI-assisted workflows and engineering standards across a large legacy codebase
  • Built crash-dump and behavioral-analysis utilities for production defense

Senior CNO Software Engineer

Raytheon Cyber

2022 - 2024

Developed advanced CNO tooling and led research into evasion, anti-analysis, and validation infrastructure across multiple operating systems.

  • Built implants, loaders, and supporting command-and-control infrastructure
  • Researched hypervisor-based and hardware-assisted evasion techniques
  • Introduced automated testing and CI patterns inside constrained environments

Software Engineer / Systems Vulnerability Analyst

National Security Agency

2020 - 2022

Worked across red- and blue-team assessments, supply-chain research, vulnerability analysis, and technical reporting for senior stakeholders.

  • Contributed to work referenced in senior-level cyber policy discussions
  • Researched SolarWinds-class attack paths and defensive replication strategies
  • Performed reverse engineering, application security audits, and tool evaluation

Credentials & Certs

TS/SCI + FSP last active 2024GSECNet+GCFAGCFECISSPGCIHGSTRTGCIA

Quick Stats

Experience

10+

Current role

Staff Engineer

Prior clearance

TS/SCI + FSP

Selected certifications

8