|
I work at the intersection of cyber threat intelligence, offensive security, application security and security product development. My focus is not only finding vulnerabilities, but also building systems that help organizations detect, understand and act on external cyber risks before they become incidents. I build security-focused tools, automate intelligence workflows and develop products around real-world attacker behavior, exposed assets, leaked credentials and fraud signals. |
CTI ████████████ Offensive Security ███████████░ Malware Analysis ██████████░░ AppSec ██████████░░ ASM ███████████░ Security Products ████████████ Automation ███████████░ |
|
Threat Proxy is a cyber threat intelligence platform designed to make external threats visible, track leaked data, monitor exposed assets and help organizations take early action. Threat Proxy ├─ Dark Web Intelligence ├─ Credential Exposure Tracking ├─ Attack Surface Visibility ├─ Malware IOC Monitoring ├─ Phishing & Brand Abuse Tracking └─ Fraud Intelligence |
See the invisible. Act early. |
|
|
|
|
|
collect → correlate → enrich → prioritize → report → act
I mostly work on systems that transform raw security signals into actionable intelligence.