Malware Triage Tooling (C++/Python)
Automated PE metadata parsing, imports/exports, strings, and cryptographic hashes (MD5/SHA-1/SHA-256), producing structured reports (CSV/JSON) for faster SOC triage and documentation.
SOC Analyst • Security Engineer • Malware Analysis • Windows Internals
I analyze malware and Windows drivers using static + dynamic techniques (IDA Pro, x64dbg, WinDbg, Ghidra), extract IOCs/persistence behaviors, and build C++/Python tooling to accelerate triage. I translate low-level findings into practical detection opportunities mapped to MITRE ATT&CK for SOC/endpoint teams.
I’m a cybersecurity analyst focused on turning deep technical investigation into defensive outcomes. I work across malware analysis, reverse engineering, and Windows internals to identify suspicious behavior patterns and convert them into detection ideas, triage playbooks, and incident response notes.
My approach is SOC-driven: validate alerts, enrich with context, extract IOCs, map behaviors to MITRE ATT&CK, and document findings for fast escalation and remediation.
What I’m targeting: SOC Analyst (Tier 1/2), Detection Engineering, Security Engineer (blue team), Incident Response support roles.
Location: Phoenix, AZ (Remote Eligible)
Strengths: Malware triage • Windows internals • IOC extraction
Outputs: Write-ups • Detection notes • Tooling (C++/Python)
Focus: SOC workflows + defensive detection
Availability: Open to SOC/Security roles
SOC-ready skills and tooling aligned to incident response, detection, and endpoint security.
Certifications: CompTia Security+, Google Cybersecurity Professional, CISSP (in progress...).
Projects focused on SOC relevance: triage automation, IOC extraction, and translating low-level analysis into detections. Replace links and screenshots with real ones as you publish.
Automated PE metadata parsing, imports/exports, strings, and cryptographic hashes (MD5/SHA-1/SHA-256), producing structured reports (CSV/JSON) for faster SOC triage and documentation.
Wrote SOC-ready detection notes based on observed malware behaviors: persistence, injection patterns, suspicious memory protections, and high-signal artifacts. Structured write-ups for escalation and rule creation.
Built a structured workflow for alert triage: normalize events, enrich with context, identify suspicious sequences, and write clear incident notes.
The fastest way to reach me is email. I’m open to SOC Analyst and Security Engineer opportunities (remote or Phoenix-area).
If you’re a recruiter: resume is available above, and I can walk through my triage tooling + analysis workflow live.