Candidate Name
I am a cybersecurity professional with over 10+ years of experience working across mobile malware analysis, reverse engineering, and threat intelligence. My day-to-day work revolves around understanding how modern mobile threats operate from multi-stage droppers and native loaders to banking malware, spyware, and obfuscation frameworks. I enjoy digging into DEX/SMALI, native libraries, and app behaviours to uncover what’s really happening under the surface.
I currently work as a Mobile Malware Analyst & Reverse Engineer, contributing research on Android malware families, building internal deobfuscation tools (Python/JavaScript/Frida), and supporting threat-hunting teams with indicators, YARA rules, and behavioural insights. Prior to threat research, I spent several years in network engineering and technical lead roles, which gave me a strong base in infrastructure, troubleshooting, and large-scale operations.
Over the years, I have worked on:
• Reverse engineering Android malware (bankers, spyware, droppers, miners)
• Dynamic analysis, Frida scripting, and instrumentation
• Automation for string decryption, DEX parsing, and static analysis
• Threat intelligence reporting, IOC generation, detection logic
• Deploying honeypots (T-Pot) and analysing phishing/vulnerability campaigns
• Building detection content using YARA, KQL, and other TI workflows
I hold CEH v9 and ECSA certifications and am currently completing CTIA v2. I have also been recognized several times as Employee of the Month for delivery, collaboration, and technical contributions.
My interests lie where reverse engineering, threat intelligence, and mobile security meet and I’m always open to connecting with others working in or hiring for these areas.
01/05/2022
01/04/2021
01/06/2013