Digital Forensic Analyst
Passionate Digital Forensic Analyst with expertise in investigating cyber incidents, analyzing digital evidence, and uncovering the truth behind security breaches. I thrive on solving complex puzzles and have a deep love for Capture The Flag (CTF) competitions, where I continuously sharpen my skills in reverse engineering, cryptography, and exploitation techniques.
Present
Conducting thorough digital investigations, analyzing evidence from various devices, preparing detailed forensic reports, and collaborating with law enforcement agencies on cybercrime cases.
Previous Role
Led incident response efforts, performed malware analysis, developed detection signatures, and implemented security improvements based on lessons learned from security incidents.
Ongoing
Active participant in Capture The Flag competitions worldwide, specializing in forensics, reverse engineering, and cryptography challenges. Continuously learning and adapting to new security challenges.
CompTIA
Foundational cybersecurity certification
VerifiedCompTIA
Cybersecurity Analyst certification
VerifiedCompTIA
Penetration testing certification
VerifiedCisco
Network fundamentals & security
VerifiedCisco
Security operations certification
VerifiedSANS Institute
Certified Forensic Examiner
VerifiedSANS Institute
Certified Incident Handler
VerifiedSANS Institute
Reverse Engineering Malware
VerifiedEC-Council
Computer Hacking Forensic Investigator
VerifiedEC-Council
Certified Ethical Hacker
VerifiedAmazon Web Services
Cloud security certification
VerifiedOffensive Security
Offensive Security Certified Professional
VerifiedDeveloped a Python-based tool for rapid forensic triage of Windows systems, automating evidence collection and initial analysis to speed up incident response.
Created custom Volatility plugins for detecting advanced malware techniques and extracting IoCs from memory dumps.
Designed and developed forensics and reverse engineering challenges for regional CTF competitions, helping train the next generation of security professionals.
Contributed YARA rules and Sigma detection rules to open-source threat intelligence repositories for detecting APT techniques.
Cybersecurity Specialization
Graduated with Honors
SANS, Offensive Security, Online Platforms
Ongoing professional development