I am a security researcher and defender who focuses on understanding the patterns behind anomalous behavior. My background bridges the gap between software development and defensive operations: moving from building secure systems to protecting them through active monitoring and triage.
My experience covers the entire intelligence lifecycle, from low-level network analysis to application-layer hardening. I specialize in identifying indicators of compromise and implementing proactive measures to mitigate threats. I am always looking for complex security challenges that require tactical response and practical problem-solving.