
I come from a nontraditional background and have focused heavily on hands on, self directed learning in systems and security engineering. My experience is centered around Windows internals, kernel-mode behavior, and low-level security research, developed through personal projects and experimentation. I spend most of my time analyzing how systems work under the hood, reverse engineering binaries, and studying memory and execution behavior. I’m especially interested in platform and endpoint security roles where deep technical understanding and careful analysis matter. I value clear documentation, defensive thinking, and building a strong foundation in fundamentals.