- Reverse Engineering & Malware Analysis
- Threat Intelligence & TTP Mapping (MITRE ATT&CK)
- Memory Forensics & Behavioral Profiling
- Linux Hardening & Secure Architecture
- Detection Engineering & Incident Response Support
- Low‑Level Development (C, C++, memory management)
- CTI Automation & Security Tooling (Python, Bash)
- Regulatory Security (NIS2, GDPR, risk frameworks)
Ghidra • IDA • Radare2 • Binary Ninja • GDB • x64dbg • CAPE • Cuckoo • Volatility • checksec
C • C++ • Python • Bash • Linux • Docker • Git • Flask • Django
STRIDE • Cyber Kill Chain • MITRE ATT&CK
Static → Dynamic → Memory → IoCs → Attribution
| Role | Organization | Focus | Timeline |
|---|---|---|---|
| Cyber Threat Analyst | Telefónica Tech | Cyber Threat Intelligence (CTI) | 2025–Present |
| Role | Organization | Focus | Timeline |
|---|---|---|---|
| Malware Intelligence | NICS Lab / VirusTotal | Reverse engineering, behavioral analysis | 2025 |
| Software Engineering (C/C++) | 42 Málaga | Low‑level architecture, memory management | 2024 |
Designed and implemented a structured hardening methodology across ten security domains, including:
UFW + fail2ban • auditd • shared memory restrictions • USB exfiltration prevention