I am a Cyber Threat Intelligence Professional specializing in the intersection of OSINT, Dark Web Intelligence, and AI Automation.
My daily work involves tracking cybercrime ecosystems (Telegram, underground forums), mapping adversary behaviors to the MITRE ATT&CK framework, and automating the intelligence cycle. I build autonomous pipelines that collect, process, and analyze threat data at scale to improve proactive threat detection.
- 🔭 Current Focus: Dark Web/Telegram Intelligence, Zero-Day/CVE Monitoring, and AI-assisted Threat Hunting.
- 🧠 Philosophy: By understanding APT operations and the threat landscape, we can engineer high-fidelity detection rules (Sigma/Elastic) and stay ahead of adversaries.
- 📚 Knowledge Base: I document my methodology, intelligence reports, and write-ups in my GitBook CTI Portfolio.
I utilize a mix of detection engineering frameworks and automation tools to build CTI solutions.
While my professional role is focused on the Threat Intel, I am an offensive security enthusiast. Keeping hands-on with ethical hacking, Bug Bounty, and CTFs allows me to understand the hacker mindset. This is critical for APT emulation, testing our defenses, and understanding the real-world impact of adversaries.
"Defense without intelligence is just a firewall configuration. Defense with intelligence is strategy."

