Capabilities
Areas of focus
The work here centers on endpoint engineering, offensive research, reverse engineering, and platform modernization.
Endpoint engineering
Windows Kernel & EDR Engineering
I build low-level telemetry, detection, and hardening capabilities intended for production environments and real attacker behavior.
- Kernel- and user-mode endpoint components in modern C++
- Behavioral detection for shellcode injection and exploit activity
- High-fidelity telemetry pipelines with practical cost discipline
Offensive research
Offensive Security & CNO Tooling
Experience building and assessing offensive tooling informs the defensive side of my work and keeps it grounded in operator reality.
- Implants, loaders, and command-and-control support tooling
- Threat modeling and OPSEC-aware engineering
- Cross-platform evasive research spanning Windows, macOS, iOS, and Linux
Reverse engineering
Reverse Engineering & Vulnerability Research
When a system is opaque, I am comfortable working at the binary level until the relevant behavior is understood.
- Binary manipulation and malicious subversion analysis
- Compiler, supply chain, and code-injection research
- Exploit development and root-cause driven security analysis
Platform modernization
Security Architecture & Platform Modernization
I work at the intersection of architecture, tooling, and engineering process, especially where mature codebases need to become faster and safer at the same time.
- Agentic and AI-assisted engineering workflows for large codebases
- Testing and CI improvements under operational constraints
- Hardening reviews against advanced attacker techniques