Security researcher with a strong focus on understanding systems from the inside out. My work sits at the intersection of defensive security, reverse engineering, and open-source intelligence — disciplines that together build a complete picture of how threats emerge, persist, and leave traces.
I approach security from a defender's mindset: the goal is not just to find vulnerabilities, but to understand attacker tradecraft deeply enough to detect, contain, and prevent it.
reverse_engineering:
- Static & dynamic binary analysis
- Malware dissection and behavior mapping
- Disassembly, decompilation, and code reconstruction
- Anti-analysis technique identification
defensive_security:
- Threat detection logic and signature development
- System hardening and attack surface reduction
- Blue team operations and adversary emulation response
- Security architecture analysis
osint:
- Passive reconnaissance and footprint mapping
- Infrastructure pivoting and attribution research
- Threat actor profiling and campaign tracking
- Open-source intelligence methodology and tooling// The best defense is built on a complete understanding of the offense.