π Iβm currently working on
Cybersecurity analysis with a focus on threat intelligence and security operations.
π§βπ€βπ§ Iβm looking to collaborate on
Projects that strengthen digital defenses and improve incident response strategies.
π€ Iβm looking for help with
Expanding community-driven intelligence sharing and advanced malware analysis techniques.
π± Iβm currently learning
Emerging threat actor tactics and evolving malware trends to stay ahead of adversaries.
π¬ Ask me about
Threat intelligence, malware analysis, and tracking cybercriminal activity.
β‘ Fun fact
I enjoy turning complex threat data into actionable insights that help protect organizations worldwide.
- Threat Intelligence: Malware analysis, IOC identification, threat actor tracking
- Security Operations: SIEM implementation, alert triage, incident response
- Tools: Wireshark, Splunk, ELK Stack, Metasploit, Burp Suite, Nmap
- Defensive Security: Vulnerability assessment, penetration testing, security hardening
- Programming: Python, Bash scripting, PowerShell
- Google Cybersecurity Professional Certificate
- Cisco Certified Ethical Hacker
- Cisco Certified Jr. Cyber Analyst
- Trivy Web Scanner: User-friendly web interface for Trivy vulnerability scanner, providing dashboard for scan management and vulnerability visualization for containers, filesystems, and Git repositories.
- Active contributor on VirusTotal, sharing threat intelligence findings
- Honeypot Implementation for Threat Intelligence: Hosted a Honeypot System using TPot Honeypot Framework on Cloud running a Debian 12 OS.

