He is the co-founder and President of the Boston Cybernetics Institute (BCI), where he drives the vision of cybersecurity training in support of national defense. He is a former researcher at MIT Lincoln Laboratory in the Cyber System Assessments group. There, his research focused on building and breaking cybersecurity solutions for the U.S. military. He also created and delivered training in reverse-engineering and exploitation to technical specialists and management personnel from the Air Force, Navy, and Special Operations communities. He is the co-creator and instructor for the MIT IAP 2016 course Software Reverse-Engineering. He is also the co-creator and instructor for the Rensselaer Polytechnic Institute (RPI) courses: Modern Binary Exploitation, Spring 2015 and Malware Analysis, Spring 2013. Blackthorne was an active member of the student security club and CTF team, RPISEC, from 2012 to 2015, where he taught seminars on reverse-engineering, exploitation, and various other cybersecurity topics. He served in the U.S. Marine Corps from 2002 to 2006 and completed three tours in Iraq. He has a BS in computer science from the University of Michigan-Dearborn and an MS in computer science from RPI. Jeremy has published research on anti-virus evasion and environmental keying in RAID, LatinCrypt, WOOT, ROOTS, and PPREW. He is currently a PhD candidate in computer science at RPI focusing on environmental keying.