root@rumais:~# cat /etc/profile

Profile

Cyber Threat Detection Engineer with experience in SOC monitoring, SIEM deployment, threat simulation, malware analysis, and purple-team validation.

Snapshot

SOC Monitoring and response support
SIEM Deployment and integration
EDR/XDR CrowdStrike, SentinelOne, Wazuh
THREAT SIM Atomic Red Team, VECTR, ATT&CK validation

Core Work

  • Build detection logic around real attacker behavior and telemetry.
  • Support SOC monitoring and managed CSOC operations.
  • Deploy and integrate SIEM and security tooling.
  • Run purple-team operations and attack simulation exercises.
  • Execute ransomware simulations and ATT&CK-based validation.
  • Analyze malware, extract IOCs, and write detection rules.

Approach

I focus on practical security work: validate controls, identify blind spots, improve detections, and make defensive workflows more effective during real incidents and simulations.

Detection Engineering Purple Team Ops Threat Simulation Malware Analysis Phishing Analysis IOC Extraction

Technical Stack

Languages: Python, Bash, C/C++

Operating Systems: Kali, Parrot, Ubuntu, Windows, CentOS, Fedora

Security Platforms: CrowdStrike, SentinelOne, Wazuh, MISP, Azure Defender, Atomic Red Team, Vectr, GuardYoo, OpenCVE, Uptime Kuma

Tools: Nmap, Nessus, Burp Suite, Metasploit, SQLMap, Nikto, Gobuster, Wireshark, Ghidra, YARA, Sigma

Working Principle

Use attacker behavior, telemetry, and incident findings to improve visibility, detection quality, and response time.

Public Links