πŸ‘¨β€πŸ’» About Me

Cybersecurity Engineer

I’m a Cybersecurity Engineer with over 4 years of experience securing enterprise systems through vulnerability assessment, penetration testing, and hybrid red and blue teaming. My unique strength lies in combining an attacker mindset with defensive strategies to help organizations proactively reduce risk and build resilient infrastructures.

βœ… Areas of Expertise

  • Offensive Security: Network and web application pentesting, social engineering, and business logic exploitation
  • Defensive Security: Threat detection, EDR/SIEM monitoring, behavioral analytics, and incident triage
  • Threat Intelligence: Malware analysis, threat hunting, and adversary emulation
  • Source Code Analysis: Manual and automated secure code review during SDLC
  • Secure Architecture: Hardening Linux/Windows systems, Active Directory defenses, Zero Trust
  • Log Analysis: Deep insights into system and security logs to detect anomalies
  • Compliance: PCI DSS, ISO/IEC 27001, secure development frameworks
πŸ“„ Download My Resume

πŸ”§ Core Expertise

  • Red Teaming & Blue Teaming
  • SIEM, EDR & Incident Response
  • Malware & Threat Analysis
  • Log Correlation & Threat Hunting
  • CVE Research & Source Code Audit
  • Reverse Engineering & Forensics
  • PCI-DSS, ISO 27001, SOC2 Compliance
  • Fintech Security & Data Protection

πŸ“œ Certifications

OSCP+
ISO 27001 Lead Auditor
CEH – Certified Ethical Hacker
CVA1 Certified

πŸ“š Research Publications

β€œCar makes and model recognition using convolutional neural network: fine-tune AlexNet architecture”
Published in: The Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) Β· Jan 12, 2024
Artificial intelligence (AI) has significantly contributed to car make and model recognition in this current era of intelligent technology. By using AI, it is much easier to identify car models from any picture or video. This paper introduces a new model by fine-tuning the AlexNet architecture to determine the car model from images. First of all, our car image dataset has been created.

πŸ› οΈ Technical Skills

Offensive Security
Burp Suite Metasploit Nmap Netcat Hydra Nikto Responder CrackMapExec Impacket BloodHound Empire
Defensive Security
Wazuh Splunk Trellix Suricata Sysmon Sigma OSQuery Velociraptor ELK Stack AlienVault OSSIM
Scripting & Automation
Python PowerShell Bash Ansible Java C/C++ YAML
Security Frameworks
MITRE ATT&CK NIST 800-53 OWASP Top 10 CIS Benchmarks PCI-DSS

πŸ” What I Do

  • Defend: Actively monitor and respond to security incidents using EDR and SIEM.
  • Offend: Simulate real-world attacks to assess and improve organizational security.
  • Analyze: Correlate logs, uncover anomalies, and hunt threats across systems.
  • Automate: Build security tools and scripts to streamline detection and response.
  • Educate: Share insights through blogs and research on CVE discoveries.

πŸ’¬ Let’s Connect

I’m open to cybersecurity collaboration, freelance consulting, or technical partnerships. Reach out via email or any of the social media listed on this website.