Background
Malware analyst and reverse engineer with a deep understanding of how adversaries build, obfuscate, and deploy malicious software. My work spans the full analysis pipeline — static triage, manual unpacking, dynamic behavioral analysis, and the production of YARA and SNORT signatures for defensive countermeasures. I write tooling in Python to automate de-obfuscation and encryption recovery, and I am comfortable reading x86/x86-64 assembly, C, C++, and .NET binaries at the instruction level.
Education
Georgia Institute of Technology — M.S. Computer Science, Systems Specialization · Apr 2025 – present
University of Maryland Global Campus — B.S. Software Development and Security · GPA 3.25 · 2020 – 2023
Certifications
GIAC Reverse Engineering Malware (GREM)
Tools & Languages
IDA Pro · Ghidra · x64dbg · WinDbg · r2 · Cutter · DNSpy · gdb · REMnux · Inetsim · BurpSuite · Wireshark · Process Monitor · Process Hacker · Autoruns · RegShot
Python · C · C++ · x86/x64 Assembly · Java · SQL · HTML