
Able to extract and analyze forensic evidence from compromised endpoints for threat hunting and incident response.

Experienced in identifying malware persistence, privilege escalation, and lateral movement techniques based on runtime behavior.

Experienced in coordinating with SOC, IT, and management teams during incident handling and reporting.

Experienced in bridging Red and Blue teams to translate attacker techniques into actionable detection logic.