

Over 4 years of hands-on experience in deep low-level Windows security research and exploit development. Highly skilled in reverse engineering both Windows Kernel-Mode and User-Mode, driver/kernel debugging, and patch-diffing for 1-day/zero-day exploitation findings. Expert in undocumented structures, Windows internals, and kernel exploitation techniques. Strong software development background in C, C++, Python, .NET and assembly. Proven ability to build detection/response content on platforms like Splunk, CrowdStrike and Cortex XDR, lead incident response teams, perform threat hunting and forensic investigations, and deliver detailed technical write-ups to the security community.