I specialize in AI automation, Linux, and all aspects of cybersecurity — Red Teaming, Blue Teaming, Digital Forensics, and building security tools. Passionate about threat detection, adversary emulation, and creating automated security solutions.
- External & Internal Penetration Testing: Nessus, Metasploit, manual exploitation frameworks
- Advanced Web Application Testing: Burp Suite, OWASP Top 10 exploitation techniques
- Active Directory Attack Simulation: Kerberoasting, Pass-the-Hash, lateral movement, privilege escalation
- Password Cracking & Credential Attacks: Hydra, Hashcat, John the Ripper, wordlist optimization
- Social Engineering & Phishing Campaign Design: SET, Gophish, pretexting techniques
- Post-Exploitation & Persistence: C2 setup (Cobalt Strike, Metasploit), data exfiltration, backdoor deployment
- SIEM Implementation & Optimization: IBM QRadar, Wazuh, Splunk, ELK Stack - log correlation, custom rules, alert tuning
- EDR/XDR Solutions: Trend Micro Vision One, endpoint threat detection and response
- Dark Web Threat Monitoring: Intelligence correlation, IoC extraction, threat actor tracking
- DLP Policy Configuration: Data exfiltration prevention, sensitive data monitoring
- Network Threat Detection: Suricata IDS/IPS, Zeek, network forensics, packet analysis
- Incident Response: SOC playbook execution, IoC triage, malware analysis, forensic investigation
- Threat Hunting: APT behavior detection using MITRE ATT&CK framework, proactive threat discovery
Advanced SIEM operations with IBM QRadar and Trend Micro. Leading alert investigation, incident response coordination, threat hunting operations, and SOC process improvements. Managing security monitoring across multiple client environments.
SIEM alert triage and analysis using IBM QRadar. Incident detection, false positive validation, DLP monitoring, and dark web threat intelligence gathering. Assisted in security investigations and playbook execution.
Digital forensics, evidence analysis, and red team operations. Conducted vulnerability assessments, assisted in incident investigations, and supported law enforcement cybercrime initiatives.
Penetration Testing, Vulnerability Assessment, Exploitation, Web App Security, Network Attacks, OSINT
SIEM (IBM QRadar, Wazuh, Splunk), EDR/XDR (Trend Micro), Threat Hunting, IDS/IPS (Suricata), Malware Analysis, Threat Intelligence, Incident Response
Metasploit, Burp Suite, Wireshark, Nmap, Hashcat, Python, Bash, Linux, Windows, Active Directory