Areas where I design, analyze, test, and validate security controls across real systems.
Defensive Security & Blue Team Operations
I work on detecting, analyzing, and responding to security threats across enterprise
environments. This includes investigating PCAPs, correlating logs, and validating
intrusion detection using tools such as Wireshark, SIEM platforms, and host-level
telemetry. My focus is on understanding attacker behavior, verifying defensive
assumptions, and ensuring monitoring and response mechanisms function under real
operational conditions.
Wireshark
SIEM
Log Analysis
Incident Response
Digital Forensics & Malware Analysis
I conduct system, memory, and network forensics to uncover unauthorized activity,
persistence mechanisms, and indicators of compromise. My experience includes static
and dynamic malware analysis using Volatility, Autopsy, PEStudio, Process Monitor,
and FakeNet-NG in controlled environments. I focus on reconstructing incident
timelines and understanding how malicious code interacts with operating systems
and networks.
Volatility
Autopsy
Process Monitor
FakeNet-NG
Application & API Security
I assess web applications and APIs for logic flaws, authorization weaknesses, and
common vulnerability patterns aligned with OWASP Top 10 and CWE standards. This
includes manual testing, automated scanning, and bug-bounty style reconnaissance
using Burp Suite and OWASP ZAP, with emphasis on trust boundaries, session handling,
and input validation.
OWASP Top 10
Burp Suite
OWASP ZAP
API Security
Cloud, Distributed Systems & Secure Infrastructure
I design and test cloud-native and distributed systems with security, resilience, and
fault tolerance in mind. My experience includes containerized deployments using
Docker and Kubernetes, distributed databases such as Apache Cassandra and
PostgreSQL, and message-driven systems built with Kafka.
AWS
Docker
Kubernetes
Kafka
Cryptography & Secure Computation
I work with applied cryptography to understand how secure systems protect data in
transit and at rest. My projects include encryption schemes, key exchange mechanisms,
perfect forward secrecy, and secure computation techniques using AES, RSA,
SHA-256, and related primitives.
AES
RSA
SHA-256
PFS
Zero Trust, IAM & Policy Engineering
I develop and test security policies aligned with Zero Trust principles, focusing on
identity, device posture, and least-privilege enforcement. This includes translating
CIS Benchmarks and architectural principles into enforceable controls, validating them
in test environments, and documenting gaps, risks, and operational impact.
Zero Trust
IAM
CIS Benchmarks
Policy Testing