root@rumais:~# cat /etc/profile
Profile
Cyber Threat Detection Engineer with experience in SOC monitoring, SIEM deployment, threat simulation, malware analysis, and purple-team validation.
Identity
Snapshot
Core Work
- Build detection logic around real attacker behavior and telemetry.
- Support SOC monitoring and managed CSOC operations.
- Deploy and integrate SIEM and security tooling.
- Run purple-team operations and attack simulation exercises.
- Execute ransomware simulations and ATT&CK-based validation.
- Analyze malware, extract IOCs, and write detection rules.
Approach
I focus on practical security work: validate controls, identify blind spots, improve detections, and make defensive workflows more effective during real incidents and simulations.
Technical Stack
Languages: Python, Bash, C/C++
Operating Systems: Kali, Parrot, Ubuntu, Windows, CentOS, Fedora
Security Platforms: CrowdStrike, SentinelOne, Wazuh, MISP, Azure Defender, Atomic Red Team, Vectr, GuardYoo, OpenCVE, Uptime Kuma
Tools: Nmap, Nessus, Burp Suite, Metasploit, SQLMap, Nikto, Gobuster, Wireshark, Ghidra, YARA, Sigma
Working Principle
Use attacker behavior, telemetry, and incident findings to improve visibility, detection quality, and response time.