Information Security | Cybersecurity Analyst | Penetration Tester | Game Developer | Capture The Flag Player
I specialize in Ethical Hacking, Malware Analysis, Vulnerability Assessment, Penetration Testing, and Information Security.
Operating across technical security operations, infrastructure protection, server and cloud security, and governance-driven information security practices.
- 🔐 Conduct vulnerability assessments and penetration testing (Web, Mobile, Infrastructure)
- 🐞 Perform malware analysis, exploitation, debugging, and remediation
- 🐧 Extensive experience with Linux systems, server hardening, and privilege escalation
- ☁️ Deploy and secure web servers and cloud-based services (AWS)
- 📜 Develop and maintain security policies, procedures, and governance frameworks
- 🖥️ Monitor and analyze logs using SIEM Event Log Analyzer (ELA)
- 🛡️ Manage and review Endpoint Protection (Antivirus)
- 👥 Conduct Active Directory auditing and access control reviews
- 🧠 Deliver cybersecurity training, seminars, and technical demonstrations
- 🌱 Continuously refining both offensive and defensive security methodologies
薪王
初始之火
狂战士铠甲
交界地
蚀之仪式