Blue team...First and foremost a software engineer with a passion for information security, and helping organizations improve their security posture by preventing both targeted attacks as well as commodity malware. I love working on innovative prevention and blocking mechanisms to stop attacks sooner in low level system drivers.Here are some topics I'm passionate about and have worked on professionally:* EDR / Detection Engineering* Purple Team Exercises * Threat Hunting* Commodity Malware and Targeted Intrusions TTPs* detection and prevention mechanisms (operation blocking, thread suspension, module load blocking, file quarantine, etc)* Windows exploit development and mitigations* C, C++, C#, Python, Powershell* Reverse Engineering (mainly Windows but also linux, Mac OS X)* SIEM (as a developer)* Threat Intelligence* OS internals* kernel debugging (WinDbg)* Standards: ATT&CK, CVE, Stix, OpenIOC, Taxii, YaraMost recently I’ve worked on designing Indicators of Attack for ATT&CK style TTPs. Both for commodity malware and hands on keyboard targeted intrusion tradecraft. In my downtime, I enjoy playing in CTFs and exploring the windows operating system.
Listed skills include Network Security, Computer Security, Security, Python, and 41 others.