Adept at reversing and neutralizing malware threats, my tenure at LTI Mindtree has honed my expertise in malware analysis and collaborative incident response. Leveraging tools like IDA Pro and Ghidra, I excel in dynamic analysis and signature development. My analytical prowess and teamwork have significantly bolstered cybersecurity defenses, showcasing a blend of technical skill and strategic collaboration.
Analyze and reverse-engineer malware threats targeting Windows, Linux, macOS, and Android platforms., Perform static and dynamic malware analysis to understand attack vectors, behavior, and impact., Develop detection signatures for antivirus, EDR, and network security tools., Utilize sandboxing and debugging tools to study malware execution., Write technical reports and threat intelligence briefs on emerging malware trends., Collaborate with incident response teams to mitigate security breaches., Automate malware analysis processes using Python, YARA rules, and scripting., Research and track advanced persistent threats (APT) and evolving cyber threats., Reverse-engineer Windows PE files, DLLs, and EXEs., Analyze Windows Registry modifications, API calls, and process injections., Detect malware using Sysinternals tools, IDA Pro, and WinDbg., Investigate ELF binaries and shell-based malware threats., Examine rootkits, cryptominers, and privilege escalation exploits., Leverage Linux forensic tools like Volatility and strace., Analyze Mach-O binaries and macOS-specific malware like adware and backdoors., Investigate LaunchDaemons, Kernel Extensions, and persistence techniques., Utilize macOS security tools like KnockKnock, TaskExplorer, and macOS sandboxing., Reverse-engineer APKs and analyze malicious applications., Detect obfuscation techniques and identify spyware/trojans., Use tools like JADX, MobSF, and Frida for dynamic analysis.
With over 2+ years of experience in reverse engineering Linux, MacOS and Android applications, I specialize in deconstructing and analyzing mobile apps to uncover vulnerabilities. I am proficient in C, C++, Embedded C, Assembly Language programming (ALP), JavaScript, and type Script. My expertise spans both dynamic and static analysis techniques, and I am skilled in using industry-standard tools like X64dbg, IDA Pro, Ghidra, Frida and JADX. I also has an hands on experience in analyzing both windows and cross platform (Linux, MacOS and Android ). have hands on experiences with writing static and generic signatures. I am eager to leverage my knowledge and skills to enhance security initiatives and contribute to safeguarding digital environments.