Summary
Overview
Work History
Education
Skills
Projects
Tools Used
Summary Objective
Timeline
Generic

Navaneeth Kumar Puthumbakam

Tampa,Florida

Summary

Adept at reversing and neutralizing malware threats, my tenure at LTI Mindtree has honed my expertise in malware analysis and collaborative incident response. Leveraging tools like IDA Pro and Ghidra, I excel in dynamic analysis and signature development. My analytical prowess and teamwork have significantly bolstered cybersecurity defenses, showcasing a blend of technical skill and strategic collaboration.

Overview

2
2
years of professional experience

Work History

Security researcher/malware analyst/Threat Hunting

LTI Mindtree
04.2021 - 06.2023
  • Analyze and reverse-engineer malware to determine its functionality and impact
  • Conduct static and dynamic analysis of malicious code, including unpacking and debugging
  • Utilize tools like IDA Pro, Ghidra, OllyDbg, and Wireshark for malware analysis
  • Develop signatures for detecting and mitigating malware threats (YARA, Snort, Suricata)
  • Collaborate with cybersecurity teams to strengthen incident response and threat intelligence
  • Monitor and analyze network traffic to identify potential security threats
  • Research and document emerging malware trends and attack techniques
  • Develop and deploy automated sandboxing environments for malware analysis
  • Assist in forensic investigations by extracting indicators of compromise (IoCs)
  • Create detailed technical reports and brief security teams on findings

Education

Masters - Information System and Management

Union Commonwealth University
Ky
08.2025

Skills

  • C language
  • C
  • Embedded C
  • Assembly language programming
  • Java Script
  • TypeScript
  • Malware analysis
  • Static analysis
  • Dynamic Analysis
  • Static and Generic Signature writing
  • PE file structure
  • Elf File structure
  • Analyzing PE files
  • Elf
  • MacOS
  • Android
  • PE studio
  • CFF explorer
  • X64 dbg
  • IDA pro
  • Ghidra
  • JADX
  • Frida

Projects

Analyze and reverse-engineer malware threats targeting Windows, Linux, macOS, and Android platforms., Perform static and dynamic malware analysis to understand attack vectors, behavior, and impact., Develop detection signatures for antivirus, EDR, and network security tools., Utilize sandboxing and debugging tools to study malware execution., Write technical reports and threat intelligence briefs on emerging malware trends., Collaborate with incident response teams to mitigate security breaches., Automate malware analysis processes using Python, YARA rules, and scripting., Research and track advanced persistent threats (APT) and evolving cyber threats., Reverse-engineer Windows PE files, DLLs, and EXEs., Analyze Windows Registry modifications, API calls, and process injections., Detect malware using Sysinternals tools, IDA Pro, and WinDbg., Investigate ELF binaries and shell-based malware threats., Examine rootkits, cryptominers, and privilege escalation exploits., Leverage Linux forensic tools like Volatility and strace., Analyze Mach-O binaries and macOS-specific malware like adware and backdoors., Investigate LaunchDaemons, Kernel Extensions, and persistence techniques., Utilize macOS security tools like KnockKnock, TaskExplorer, and macOS sandboxing., Reverse-engineer APKs and analyze malicious applications., Detect obfuscation techniques and identify spyware/trojans., Use tools like JADX, MobSF, and Frida for dynamic analysis.

Tools Used

  • PE studio
  • CFF explorer
  • X64 dbg
  • IDA pro
  • Ghidra
  • JADX
  • Frida

Summary Objective

With over 2+ years of experience in reverse engineering Linux, MacOS and Android applications, I specialize in deconstructing and analyzing mobile apps to uncover vulnerabilities. I am proficient in C, C++, Embedded C, Assembly Language programming (ALP), JavaScript, and type Script. My expertise spans both dynamic and static analysis techniques, and I am skilled in using industry-standard tools like X64dbg, IDA Pro, Ghidra, Frida and JADX. I also has an hands on experience in analyzing both windows and cross platform (Linux, MacOS and Android ). have hands on experiences with writing static and generic signatures. I am eager to leverage my knowledge and skills to enhance security initiatives and contribute to safeguarding digital environments.

Timeline

Security researcher/malware analyst/Threat Hunting

LTI Mindtree
04.2021 - 06.2023

Masters - Information System and Management

Union Commonwealth University
Navaneeth Kumar Puthumbakam