Evan Jensen

He is the co-founder and CTO of BCI, where he splits his time between performing assessments for clients and teaching cybersecurity topics. He is an experienced instructor in reverse- engineering and exploitation. Evan has taught reverse-engineering at BU, RPI, NYU, MIT, the United States Military Academy at West Point and MIT Lincoln Laboratory. Before BCI, Evan worked for MIT Lincoln Laboratory’s Cyber System Assessments Group and Facebook’s redteam. He was an instructor for NYU's weekly Hack Night from 2011 to 2014, covering reverse-engineering, exploitation, and various other cybersecurity topics [1]. He developed nearly all of the lessons for Trail of Bits' CTF Field Guide, covering vulnerability discovery, exploitation, forensics, and operational tradecraft [2]. Jensen was heavily involved in teaching cybersecurity in the NYU Polytechnic community. He was co-instructor with Dan Guido for the course Penetration Testing and Vulnerability Analysis during Fall 2012 and Fall 2013 [3], and was a teaching assistant for Neil Daswani for the course Application Security during Spring 2013 [4]. Passionate about enabling others to learn via the medium of repeated failure, he was CTF captain of Brooklynt_Overflow from 2012 to 2014 and founding member/captain of Lab RATs from 2014 to 2016 which placed 10th in the most recent DEFCON CTF finals.


  1. “NYU Tandon’s OSIRIS Lab’s Hack Night.” [Online]. Available:

    https://github.com/isislab/Hack-Night. [Accessed: 02-Apr-2018].

  2. A. Ruef et al., “CTF Field Guide.” [Online]. Available: https://trailofbits.github.io/ctf/. [Accessed: 04-Mar-2018].

  3. E. Jensen and D. Guido, “CS 6573 Penetration Testing and Vulnerability Analysis.”

    [Online]. Available: http://bulletin.engineering.nyu.edu/preview_course_nopop.php?catoid=5&coid=14223. [Accessed: 04-Mar-2018].

  4. N. Daswani, “CS-GY 9163 Application Security,” 2014. [Online]. Available: http://bulletin.engineering.nyu.edu/preview_course_nopop.php?catoid=9&coid=23997. [Accessed: 04-Mar-2018].