Cyber Threat Researcher with 8 years of experience building intelligence-driven security operations, adversary research programs, and detection engineering capabilities across enterprise environments.
Operationalizing intelligence into detection, hunting, and response workflows.
Researching adversarial AI, makware, vulnerability, telecom/5G, Quantum, cloud, and supply chain threats.
YARA, Sigma, SIEM/SOAR detections, telemetry correlation, and ATT&CK mapping.
I specialize in transforming threat intelligence into practical security outcomes. My work spans adversary research, threat hunting, malware analysis, detection engineering, AI security, and intelligence-driven security operations.
Throughout my career, I have built honeynet infrastructure, operationalized intelligence workflows, developed detection content, and led research into emerging threats targeting cloud, AI, telecom, and enterprise environments.
I actively collaborate with SOC, DFIR, and engineering teams to bridge the gap between intelligence and action.
Author of “Learn How to Defend Against Cyber Crimes, In Just One Day” — focused on helping individuals and organizations defend against evolving cyber threats.
Adversary behavior mapping, detection coverage analysis, and threat-informed defense.
Researching AI attack techniques, adversarial ML threats, and AI security operations.
Managing socio-technical risks, trustworthiness, and safety in AI systems.
Adversary behavior modeling for 5G/6G networks and telecommunications infrastructure.
Defensive countermeasure mapping and detection engineering strategy alignment.
Threat modeling, intrusion analysis, and adversary lifecycle disruption.
Securing Large Language Models against prompt injection, data leakage, and vulnerabilities.
Holistic cybersecurity governance, risk management, and operational resilience standards.
Feel free to connect with me.