Red & Blue Teaming | Offensive & Defensive Security Expert | CEH Certified
Turning passion into protection — delivering real-world cybersecurity solutions that make impact.
From simulating real-world incidents on Let'sDefend to analyzing threats like a SOC Analyst in action — my journey into blue teaming is a blend of hands-on detection, investigation, and defense. Every log, every alert, is a step toward mastering the art of cyber resilience.
From real-time alert triage to incident analysis, I bring hands-on experience in SOC workflows. My skillset includes working with SIEM tools, conducting log analysis, performing threat intelligence correlation, and applying MITRE ATT&CK for structured defense. Proficient in identifying, investigating, and responding to cyber threats with precision.
SOC monitoring, incident analysis, log reviews, and threat hunting — here’s a showcase of the projects and client engagements where I’ve protected systems and prevented breaches.
Hands-on experience with real-time alerts, incident simulations, and blue team scenarios. My Let'sDefend public profile highlights the cases I’ve resolved and skills I’ve earned along the way.
From offensive testing to defensive operations—here’s a look at the solutions, tools, and services I’ve built to secure the digital world.
Dive into my real-world vulnerability discoveries and security contributions on Bugcrowd, where collaboration meets cutting-edge cybersecurity challenges.
Uncover the critical vulnerabilities I’ve identified on HackerOne, helping global organizations strengthen their security posture through responsible disclosure.
Track my hands-on SOC analyst journey at LetsDefend — mastering real-world incident detection, response, and continuous threat hunting.
Showcasing my achievements and expertise in cybersecurity through globally recognized certifications.
Proficient in uncovering security flaws and fortifying systems against cyber threats using industry-standard ethical hacking methodologies.
View CredentialsDemonstrates mastery in securing cloud identities and enforcing access controls within Microsoft Azure environments, ensuring robust enterprise-grade security.
View CredentialsProven expertise in real-time threat detection, incident response, and security monitoring within a simulated SOC environment.
Specialized in proactive threat identification, attack surface analysis, and adversary hunting to strengthen organizational security postures.
View CredentialsEquips professionals with offensive and defensive cybersecurity techniques to ethically assess, exploit, and secure digital infrastructures.
View CredentialsExplore my contributions to the open-source community, showcasing tools and projects designed to enhance cybersecurity.