Independent Technical Consultant

Albert Pittman

Embedded Android · Forensic Binary Analysis · AOSP Platform Engineering
be.rt.pittman76@gmail.com (730) 233-9281 Remote · Contract · Project-based
01 What I Do

I solve the problems your team has already decided are unsolvable. I work from raw binary outward — no assumptions, no borrowed values, no guessing. If the hardware did not say it, it does not exist in my work. Every value I produce is traceable to a physical hardware source.

I have been building things since 1982 — skilled trades, computing, embedded systems. If it can be built, I can build it. I do not stop until I know I am right. Pressure is not a problem. It is motivation.

02 Core Capabilities
Forensic Binary Analysis
Boot image internals, partition archaeology, hardware identity recovered from raw hex. No tool output trusted until cross-verified against binary.
AOSP Platform Engineering
Full AOSP build system from Makefile and BoardConfig level. Device tree construction with zero borrowed values. Documented, reproducible builds.
MediaTek Platform Depth
BROM, LK bootloader, TEE, PMIC, ATF, SCP — full stack hardware bring-up. Proven on production MTK silicon including undocumented Franken-SoC configurations.
Embedded Android Recovery
TWRP build and validation, FBE crypto chain verification, fstab forensics, blob dependency audits, init hook parity — from scratch, device-agnostic.
Hardware Interrogation
Live device analysis via ADB, MTK Client BROM-level backup, NVRAM archaeology, DTB/DTBO decode, GPIO mapping, coprocessor identification.
Methodology & Documentation
Forensic investigation schemas, build control documents, pre-build validation rule sets — every value source-coded to a hardware evidence section. No assumption goes undocumented.
03 How I Work
04 Who I Work With
OEMs & ODMs
Hardware companies bringing up Android on new silicon. Industrial tablets, rugged devices, wearables, kiosks, medical hardware. I build the platform layer your application team needs to stand on — correctly, the first time.
Mobile Security Firms
Companies that need someone who thinks forensically about Android hardware — not just the OS layer. Boot chain analysis, partition-level investigation, TEE and crypto chain verification. I work the same way your analysts do: from evidence, not assumption.
MDM / EMM Vendors & Device Fleet Operators
Companies managing large fleets of Android hardware who hit platform-level problems their application team cannot reach. Recovery engineering, partition integrity, bring-up failures. I go to the level the problem actually lives at.
Engagements I Do Not Take
Clients who want shortcuts. Clients who want a deliverable they can show management instead of an answer. Clients who will push back on methodology to save time. If you need it done right, I am the right call. If you need it done fast and approximate, I am not.
05 Engagement Model
FORMAT Remote contract. Project-based or retainer. No relocation.
SCOPE Forensic audits, platform bring-up, build system engineering, recovery development, binary analysis — define the problem, I scope the work.
DELIVERABLES Documented findings, verified build artifacts, reproducible methodology. You own the work product completely.
TIMELINE Available now. Pressure-tolerant. Hard deadlines are fine.
CONTACT be.rt.pittman76@gmail.com  ·  (730) 233-9281
EVERY VALUE TRACEABLE TO HARDWARE EVIDENCE