In addition to creating courses for MITRE ATT&CK Defender™, Daniel has worked as a developer squad lead in MITRE's CALDERA™ project for automating adversary emulation and currently serves as one of the developer leads for MITRE ATT&CK® Evaluations. As part of these roles, Daniel has had the opportunity to participate in numerous purple team events and shape adversary emulation efforts for various organizations. Prior to joining MITRE, Daniel received a B.S. in Computer Science, with a specialization in cybersecurity, as well as a B.S. in Mathematics from the University of Maryland, College Park. While he originally planned on working in the field of biology and natural sciences, he found an interest in computer science, which quickly turned into a passion for cybersecurity in college. Outside of work, Daniel enjoys hiking with his dog, gardening with his wife, and trying out new recipes for dinnertime - his current favorites are Peruvian and Indian cuisines.