Technical Expertise

Penetration Testing

  • Web Application Testing
  • Network Infrastructure Testing
  • Active Directory Testing

Vulnerability Assessment

  • Vulnerability Scanning
  • Nessus
  • Risk Assessment

Exploit Development

  • Reverse Engineering
  • Malware Analysis

CTF Competitions

  • Web Exploitation
  • Large Language Model
  • Infrastructure
  • Open Source Intelligence

Security Operations

  • SIEM Implementation & Management
  • Security Monitoring
  • Threat Detection
  • Alert Triage
  • Incident Response

Network Security

  • Firewall Configuration
  • IDS/IPS Management
  • VPN Implementation
  • Network Segmentation
  • Traffic Analysis

Endpoint Security

  • EDR Solutions
  • Host-based Firewalls
  • Endpoint Hardening

Threat Hunting

  • IOC Development
  • Behavioral Analysis
  • Forensic Investigation

Regulatory Compliance

  • GDPR
  • HIPAA
  • PCI DSS
  • SOX
  • PDPA
  • IMDA Cop TCS

Security Frameworks

  • NIST Cybersecurity Framework
  • ISO 27001/27002
  • COBIT
  • MITRE ATT&CK
  • STRIDE

Risk Management

  • Risk Assessment
  • Threat Modeling
  • Business Impact Analysis

Policy Development

  • Security Policies
  • Standards & Procedures
  • Guidelines
  • Security Awareness

Programming Languages

  • Python
  • C
  • Rust
  • Bash/Shell Scripting
  • JavaScript

Cryptography

  • Encryption Algorithms
  • PKI
  • Hashing
  • Digital Signatures
  • TLS/SSL

Tools & Technologies

Penetration Testing

Metasploit Burp Suite Nmap Wireshark OWASP ZAP Kali Linux Aircrack-ng Hashcat sqlmap Netexec

Security Operations

Splunk ELK Stack Snort Suricata

Cloud

AWS Docker Kubernetes

Soft Skills

Organization Teamwork Project Management Problem Solving Report Writing Adaptability

Let's Work Together

Want to know more about me?

Contact Me