
Security researcher with ten years of hands-on experience in malware analysis, exploit development, threat hunting, red teaming, vulnerability assessment, penetration testing, and adversary tradecraft. Adept at transforming complex technical insights into actionable defensive strategies. Experienced in leading projects, coordinating cross-functional efforts, and driving initiatives from concept to execution.
Known for innovating and delivering proof-of-concepts on emerging technologies, with a strong ability to evaluate, design, and implement advanced security solutions. Highly organized, and skilled in mentoring, coaching, and motivating teams to achieve high performance. Thrives in fast-paced environments, balancing multiple priorities while maintaining a focus on quality, efficiency, and continuous improvement. Seeking a leadership role that leverages my technical depth, strategic mindset, and commitment to professional growth.
Threat Hunting, Cyber Kill Chain Analysis, Detection Engineering, Incident Investigation and Response, Automated Incident Investigation Using Security Notebooks.
EDR Alert Triage, Investigation, and Root Cause Analysis (RCA); Malware Analysis and Research, Detection Signature Development (Generic and Behavioral Antivirus Signatures), Advanced Persistent Threat (APT) Simulation and Emulation.
Incident Response, Malware Analysis & Reverse Engineering, Red Teaming & Adversary Emulation, Exploit Development & Vulnerability Research
Collaborated with business teams to gather requirements for BW projects. Designed and implemented ETL processes to integrate data from multiple sources.