Jared Evans

Information Security Officer
Gallaudet Technology Services

Jared Evans

Phone Numbers

202-796-2255 (VP)


Login to view


Edward Miner Gallaudet Memorial Building B16

Evans came to Gallaudet University after working for over 23 years across a variety of Information Technology roles, including 10 years in the VRS industry. He earned a Bachelor of Science in Information Technology in 1997 from Rochester Institute of Technology.

  • Development and delivery of a comprehensive information security and privacy program for all divisions at Gallaudet University (GU);
  • Assures that the University complies with statutory and regulatory requirements regarding information access, security, and privacy;
  • Coordinates the development of information security policies, standards, and procedures;
  • Coordinates the development of delivery of an education and training program on information security and privacy for employees, other authorized users, and students;
  • Monitors and enforces practices and policies to ensure University data is properly secure from unauthorized access, manipulation, and distribution;
  • Responds to information security incidents and leads resolution efforts; and participates and performs in auditing activities (external or internal).

Adjunct Professor, Information Technology (Spring 2020), Malware Analysis

How to analyze different types of malware using disassemblers, debuggers, static and dynamic analysis, using IDA Pro, OllyDbg and other tools.

Students will learn how to:

  • Describe different types of malware
  • Perform basic static analysis using scanning tools
  • Perform basic dynamic analysis with a VM sandbox
  • Perform advanced static analysis with IDA Pro
  • Perform advanced dynamic analysis with a debugger
  • Use a kernel debugger
  • Explain malware behavior, including launching, encoding and network signatures
  • Detect packers and how to unpack them

Adjunct Professor, Information Technology (Fall 2010), Network Security

Taught Information Technology Fundamentals of Network Security. Used VMware virtualization technology to assign Fedora Linux virtual machines to student teams to help them learn and implement security practices directly on the servers. Topics included:

• Federal regulations for data privacy and protection
• Organizational factors affecting security such as network policies and human behavior
• Understanding different profiles of hackers, including advanced persistent threats (APT); stages of a successful exploitation 
• TCP/IP: nmap for reconnaissance and running stealthy port scans
• How man-in-the-middle attacks are carried out with ARP poisioning
• Seeing cryptography in action across the network: Analysis of a Wireshark network trace of a HTTPS session being established 
• Wi-Fi encryption and wireless attack methods 
• Composing iptables rules to block attacks and improve the security of a server


800 Florida Avenue NE
Washington, DC 20002


800 Florida Avenue NE
Washington, DC 20002