Jared Evans

Information Security Officer
Gallaudet Technology Services

Jared Evans

Phone Numbers

202-796-2255 (VP)




Edward Miner Gallaudet Memorial Building B16

Evans came to Gallaudet University after working in the Video Relay Service industry for over 10 years in a variety of Information Technology roles. He earned a Bachelor of Science in Information Technology in 1997 from Rochester Institute of Technology.

Development and delivery of a comprehensive information security and privacy program for all divisions at Gallaudet University (GU); assures that the University complies with statutory and regulatory requirements regarding information access, security, and privacy; coordinates the development of information security policies, standards, and procedures; coordinates the development of delivery of an education and training program on information security and privacy for employees, other authorized users, and students; monitors and enforces practices and policies to ensure University data is properly secure from unauthorized access, manipulation, and distribution; responds to information security incidents and leads resolution efforts; and participates and performs in auditing activities (external or internal).

Adjunct Professor, Information Technology (Spring 2020), Malware Analysis

How to analyze different types of malware using disassemblers, debuggers, static and dynamic analysis, using IDA Pro, OllyDbg and other tools.

Students will learn how to:

  • Describe different types of malware
  • Perform basic static analysis using scanning tools
  • Perform basic dynamic analysis with a VM sandbox
  • Perform advanced static analysis with IDA Pro
  • Perform advanced dynamic analysis with a debugger
  • Use a kernel debugger
  • Explain malware behavior, including launching, encoding and network signatures
  • Detect packers and how to unpack them

Adjunct Professor, Information Technology (Fall 2010), Network Security

Taught Information Technology Fundamentals of Network Security. Used VMware virtualization technology to assign Fedora Linux virtual machines to student teams to help them learn and implement security practices directly on the servers. Topics included:

• Federal laws covering protection of sensitive information and abuse 
• Organizational factors such as human behavior and network policies
• Understanding the different profiles of hackers, including advanced persistent threats (APT); stages of a successful exploitation and subsequent covering up 
• TCP/IP topics: how nmap exploits the three-way handshake during port scans 
• ARP-poisoning to start man-in-the-middle attacks using dsniff suite 
• Understanding cryptography over the network including a classroom analysis using a Wireshark capture of a HTTPS session being established 
• Wi-Fi encryption and wireless attack methods 
• Setting up and testing different iptables rules to improve the security of a server


800 Florida Avenue NE
Washington, DC 20002


800 Florida Avenue NE
Washington, DC 20002