Blue Team Analyst |
Alert triage · log correlation · incident escalation · malware & network analysis
SOC / Blue Team analyst focused on detection, triage, and incident response.
Recent M.Sc. graduate (IT & Security) with hands-on experience in SIEM alert triage, log correlation, threat hunting, and basic malware analysis.
Interested in SOC Analyst (L1/L2) roles where I can own alerts end-to-end, improve detection quality, and contribute to response playbooks.
Focus: IT & Security · Thesis: OT firmware vulnerability detection (reverse engineering)
Troubleshot industrial machinery (hardware + software), supported installs and preventive maintenance, delivered IT/user training, and tracked resolutions via CRM tickets to minimize downtime.
Full professional history available on LinkedIn
YARA signatures · Ghidra RE · CVE-2015-4590 · STM32 · CFG isomorphism
ASSA ABLOY CLIQ · 1-Wire protocol · Signal capture · Cryptography
Ghidra analysis · Algorithm recovery · Stripped ELF · C keygen
Wireshark · Phishing → C2 chain · TLS SNI · MITRE ATT&CK techniques
TryHackMe · December 2025
LinkedIn Learning
Coursera Project
LinkedIn Learning
Coursera
Coursera
I'm currently looking for a Junior SOC Analyst / Blue Team role (L1/L2). I enjoy alert triage, log correlation, and writing clear investigation notes that help teams respond faster.
Cologne, Germany
Open to opportunities