about

Background

Malware analyst and reverse engineer with a deep understanding of how adversaries build, obfuscate, and deploy malicious software. My work spans the full analysis pipeline — static triage, manual unpacking, dynamic behavioral analysis, and the production of YARA and SNORT signatures for defensive countermeasures. I write tooling in Python to automate de-obfuscation and encryption recovery, and I am comfortable reading x86/x86-64 assembly, C, C++, and .NET binaries at the instruction level.

Education

Georgia Institute of Technology — M.S. Computer Science, Systems Specialization  ·  Apr 2025 – present

University of Maryland Global Campus — B.S. Software Development and Security  ·  GPA 3.25  ·  2020 – 2023

Certifications

GIAC Reverse Engineering Malware (GREM)

Tools & Languages

IDA Pro · Ghidra · x64dbg · WinDbg · r2 · Cutter · DNSpy · gdb · REMnux · Inetsim · BurpSuite · Wireshark · Process Monitor · Process Hacker · Autoruns · RegShot

Python · C · C++ · x86/x64 Assembly · Java · SQL · HTML