Cyber Exploiter
CurrentSpearheaded the development of an enterprise RAG pipeline to augment defensive cyber analysis through enhanced PCAP analysis, enhanced malware analysis and advanced logs parsing and analysis.Developed novel ensemble methods for authorship fraud detection that includes classification, tone analysis and stylographyManaged multi-million-dollar contracts for.