Blue team defender with a red team curiosity. I don't just detect threats — I investigate, respond, remediate, hunt, and harden. From incident response to forensics to adversary emulation, I cover the full spectrum of cyber defense.
I'm a cybersecurity professional with a computer engineering foundation and a hands-on approach to defense. My work spans the full blue team lifecycle — from real-time incident triage and threat hunting, to root cause analysis, digital forensics, vulnerability management, and building the playbooks that keep operations battle-ready.
But defense alone isn't enough. I actively study offensive techniques — penetration testing, exploitation, and adversary tradecraft — because understanding how systems break is the fastest way to make them unbreakable. I believe the best defenders think like attackers, and I bring that mindset to everything I do.
Certified with CompTIA Security+ and GIAC GCIH, and experienced across SIEM, EDR/XDR, cloud, and forensics platforms. Based in Toronto, always learning, always hunting.
Performed comprehensive penetration testing on an Android application including reconnaissance, static/dynamic analysis, and API testing. Assessed APK security against OWASP Mobile Top 10, documented vulnerabilities, and initiated compliance remediation.
Analyzed Windows file systems, UAC, and registry. Set up Active Directory Domain Services, managed users, group policies, and authentication. Used Metasploit to assess vulnerabilities and exploit system misconfigurations — then hardened the environment against the same attack vectors.
Captured forensic images in E01 and DD formats for Linux-based analysis. Performed volatile memory acquisition using LiME, fmem, and Netcat. Analyzed NTFS file systems and validated file signatures through hex analysis to ensure evidence integrity.