About me
Aditya Singh
I'm a cybersecurity analyst and threat researcher passionate about defending organizations against sophisticated cyber threats and advancing security through research.
With hands-on experience in incident response, malware analysis, and security engineering, I bridge the gap between threat intelligence and defensive operations through custom tooling, forensic investigation, and strategic security implementations.
what I can do for you
As a cybersecurity analyst, I am a digital defender, building robust security infrastructures that protect organizations and uncover hidden threats.
1. Threat Detection & Analysis
SIEM implementation and monitoring
Malware analysis and reverse engineering
Decrease Noise
Network traffic analysis
2. Incident Response
Logo and brand identity design
Social media graphics and ad creatives
Infographics and data visualization
Custom illustrations and icons
3. Security Engineering
Responsive website design
Landing page design and optimization
Webflow development and customization
Website maintenance and updates
4. Research & Development
Brand strategy and identity development
Visual style guide creation
Typography and color scheme selection
Brand storytelling and messaging
1. Threat Detection & Analysis
SIEM implementation and monitoring
Malware analysis and reverse engineering
Decrease Noise
Network traffic analysis
2. Incident Response
Logo and brand identity design
Social media graphics and ad creatives
Infographics and data visualization
Custom illustrations and icons
3. Security Engineering
Responsive website design
Landing page design and optimization
Webflow development and customization
Website maintenance and updates
4. Research & Development
Brand strategy and identity development
Visual style guide creation
Typography and color scheme selection
Brand storytelling and messaging
1. Threat Detection & Analysis
SIEM implementation and monitoring
Malware analysis and reverse engineering
Decrease Noise
Network traffic analysis
2. Incident Response
Logo and brand identity design
Social media graphics and ad creatives
Infographics and data visualization
Custom illustrations and icons
3. Security Engineering
Responsive website design
Landing page design and optimization
Webflow development and customization
Website maintenance and updates
4. Research & Development
Brand strategy and identity development
Visual style guide creation
Typography and color scheme selection
Brand storytelling and messaging
DISCOVER MY JOURNEY IN CYBERSECURITY
From curious technology enthusiast to cybersecurity professional, my path has been shaped by a passion for understanding cyber threats and building secure digital environments, blending threat intelligence, incident response, malware analysis, and security research into every project.
Senior Security Researcher
Siemens Healthineers
Feb. 2026 - Present
Senior Security Researcher
Siemens Healthineers
Feb. 2026 - Present
Senior Security Researcher
Siemens Healthineers
Feb. 2026 - Present
Security Researcher
Turtleneck Systems
May 2024 - Feb. 2026
Security Researcher
Turtleneck Systems
May 2024 - Feb. 2026
Security Researcher
Turtleneck Systems
May 2024 - Feb. 2026
CYBERSECURITY ANALYST
Plutos One Technology
Sept 2023 - May 2024
CYBERSECURITY ANALYST
Plutos One Technology
Sept 2023 - May 2024
CYBERSECURITY ANALYST
Plutos One Technology
Sept 2023 - May 2024
THREAT ANALYST INTERN
NCIIPC
July 2023 - Sept 2023
THREAT ANALYST INTERN
NCIIPC
July 2023 - Sept 2023
THREAT ANALYST INTERN
NCIIPC
July 2023 - Sept 2023
RESEARCH COLLABORATOR
IIT Bombay
May 2024 - July 2024
RESEARCH COLLABORATOR
IIT Bombay
May 2024 - July 2024
RESEARCH COLLABORATOR
IIT Bombay
May 2024 - July 2024
My Tech Stack
I work across the security stack, Python for automation, Wazuh and Splunk for monitoring, Azure and GCP for cloud defense, Ghidra and YARA for malware analysis. Each tool is chosen to detect threats faster and respond more effectively.

Python / Bash / Powershell
My primary language for building security tools, automation scripts, and malware analysis frameworks, powerful, versatile, and essential for incident response.

Python / Bash / Powershell
My primary language for building security tools, automation scripts, and malware analysis frameworks, powerful, versatile, and essential for incident response.

Python / Bash / Powershell
My primary language for building security tools, automation scripts, and malware analysis frameworks, powerful, versatile, and essential for incident response.

Wazuh / Splunk / ELK Stack
My go-to SIEM platforms for log analysis, threat detection, and security monitoring—real-time visibility into what's happening across the infrastructure.

Wazuh / Splunk / ELK Stack
My go-to SIEM platforms for log analysis, threat detection, and security monitoring—real-time visibility into what's happening across the infrastructure.

Wazuh / Splunk / ELK Stack
My go-to SIEM platforms for log analysis, threat detection, and security monitoring—real-time visibility into what's happening across the infrastructure.

Microsoft Defender Suite
Enterprise-grade endpoint protection and threat intelligence platform I use for detecting and responding to advanced threats across Windows environments

Microsoft Defender Suite
Enterprise-grade endpoint protection and threat intelligence platform I use for detecting and responding to advanced threats across Windows environments

Microsoft Defender Suite
Enterprise-grade endpoint protection and threat intelligence platform I use for detecting and responding to advanced threats across Windows environments

Yara
My signature-based malware detection tool—perfect for creating custom rules to identify and classify threats during forensic investigations.

Yara
My signature-based malware detection tool—perfect for creating custom rules to identify and classify threats during forensic investigations.

Yara
My signature-based malware detection tool—perfect for creating custom rules to identify and classify threats during forensic investigations.

Ghidra / Cutter / CAPE Sandbox
My complete malware analysis toolkit for reverse engineering, dynamic analysis, and behavioral observation—dissecting binaries, detonating samples, and understanding how threats operate at the code level.

Ghidra / Cutter / CAPE Sandbox
My complete malware analysis toolkit for reverse engineering, dynamic analysis, and behavioral observation—dissecting binaries, detonating samples, and understanding how threats operate at the code level.

Ghidra / Cutter / CAPE Sandbox
My complete malware analysis toolkit for reverse engineering, dynamic analysis, and behavioral observation—dissecting binaries, detonating samples, and understanding how threats operate at the code level.

Azure / GCP / AWS
My cloud security stack for protecting infrastructure—from Azure Security Center for posture management to Google Cloud Armor for DDoS protection and web application firewalls.

Azure / GCP / AWS
My cloud security stack for protecting infrastructure—from Azure Security Center for posture management to Google Cloud Armor for DDoS protection and web application firewalls.

Azure / GCP / AWS
My cloud security stack for protecting infrastructure—from Azure Security Center for posture management to Google Cloud Armor for DDoS protection and web application firewalls.









Recent Achievements
A track record of technical excellence. From securing winners at National hackathons to unveiling novel research at global summits.



Hi
Hi
Hi
Let's work together
Let's build something secure together, whether it's implementing a SIEM, responding to an incident, or developing custom security tools.
About me
Aditya Singh
I'm a cybersecurity analyst and threat researcher passionate about defending organizations against sophisticated cyber threats and advancing security through research.
With hands-on experience in incident response, malware analysis, and security engineering, I bridge the gap between threat intelligence and defensive operations through custom tooling, forensic investigation, and strategic security implementations.
what I can do for you
As a cybersecurity analyst, I am a digital defender, building robust security infrastructures that protect organizations and uncover hidden threats.
1. Threat Detection & Analysis
SIEM implementation and monitoring
Malware analysis and reverse engineering
Decrease Noise
Network traffic analysis
2. Incident Response
Logo and brand identity design
Social media graphics and ad creatives
Infographics and data visualization
Custom illustrations and icons
3. Security Engineering
Responsive website design
Landing page design and optimization
Webflow development and customization
Website maintenance and updates
4. Research & Development
Brand strategy and identity development
Visual style guide creation
Typography and color scheme selection
Brand storytelling and messaging
1. Threat Detection & Analysis
SIEM implementation and monitoring
Malware analysis and reverse engineering
Decrease Noise
Network traffic analysis
2. Incident Response
Logo and brand identity design
Social media graphics and ad creatives
Infographics and data visualization
Custom illustrations and icons
3. Security Engineering
Responsive website design
Landing page design and optimization
Webflow development and customization
Website maintenance and updates
4. Research & Development
Brand strategy and identity development
Visual style guide creation
Typography and color scheme selection
Brand storytelling and messaging
1. Threat Detection & Analysis
SIEM implementation and monitoring
Malware analysis and reverse engineering
Decrease Noise
Network traffic analysis
2. Incident Response
Logo and brand identity design
Social media graphics and ad creatives
Infographics and data visualization
Custom illustrations and icons
3. Security Engineering
Responsive website design
Landing page design and optimization
Webflow development and customization
Website maintenance and updates
4. Research & Development
Brand strategy and identity development
Visual style guide creation
Typography and color scheme selection
Brand storytelling and messaging
DISCOVER MY JOURNEY IN CYBERSECURITY
From curious technology enthusiast to cybersecurity professional, my path has been shaped by a passion for understanding cyber threats and building secure digital environments, blending threat intelligence, incident response, malware analysis, and security research into every project.
Senior Security Researcher
Siemens Healthineers
Feb. 2026 - Present
Senior Security Researcher
Siemens Healthineers
Feb. 2026 - Present
Senior Security Researcher
Siemens Healthineers
Feb. 2026 - Present
Security Researcher
Turtleneck Systems
May 2024 - Feb. 2026
Security Researcher
Turtleneck Systems
May 2024 - Feb. 2026
Security Researcher
Turtleneck Systems
May 2024 - Feb. 2026
CYBERSECURITY ANALYST
Plutos One Technology
Sept 2023 - May 2024
CYBERSECURITY ANALYST
Plutos One Technology
Sept 2023 - May 2024
CYBERSECURITY ANALYST
Plutos One Technology
Sept 2023 - May 2024
THREAT ANALYST INTERN
NCIIPC
July 2023 - Sept 2023
THREAT ANALYST INTERN
NCIIPC
July 2023 - Sept 2023
THREAT ANALYST INTERN
NCIIPC
July 2023 - Sept 2023
RESEARCH COLLABORATOR
IIT Bombay
May 2024 - July 2024
RESEARCH COLLABORATOR
IIT Bombay
May 2024 - July 2024
RESEARCH COLLABORATOR
IIT Bombay
May 2024 - July 2024
My Tech Stack
I work across the security stack, Python for automation, Wazuh and Splunk for monitoring, Azure and GCP for cloud defense, Ghidra and YARA for malware analysis. Each tool is chosen to detect threats faster and respond more effectively.

Python / Bash / Powershell
My primary language for building security tools, automation scripts, and malware analysis frameworks, powerful, versatile, and essential for incident response.

Python / Bash / Powershell
My primary language for building security tools, automation scripts, and malware analysis frameworks, powerful, versatile, and essential for incident response.

Python / Bash / Powershell
My primary language for building security tools, automation scripts, and malware analysis frameworks, powerful, versatile, and essential for incident response.

Wazuh / Splunk / ELK Stack
My go-to SIEM platforms for log analysis, threat detection, and security monitoring—real-time visibility into what's happening across the infrastructure.

Wazuh / Splunk / ELK Stack
My go-to SIEM platforms for log analysis, threat detection, and security monitoring—real-time visibility into what's happening across the infrastructure.

Wazuh / Splunk / ELK Stack
My go-to SIEM platforms for log analysis, threat detection, and security monitoring—real-time visibility into what's happening across the infrastructure.

Microsoft Defender Suite
Enterprise-grade endpoint protection and threat intelligence platform I use for detecting and responding to advanced threats across Windows environments

Microsoft Defender Suite
Enterprise-grade endpoint protection and threat intelligence platform I use for detecting and responding to advanced threats across Windows environments

Microsoft Defender Suite
Enterprise-grade endpoint protection and threat intelligence platform I use for detecting and responding to advanced threats across Windows environments

Yara
My signature-based malware detection tool—perfect for creating custom rules to identify and classify threats during forensic investigations.

Yara
My signature-based malware detection tool—perfect for creating custom rules to identify and classify threats during forensic investigations.

Yara
My signature-based malware detection tool—perfect for creating custom rules to identify and classify threats during forensic investigations.

Ghidra / Cutter / CAPE Sandbox
My complete malware analysis toolkit for reverse engineering, dynamic analysis, and behavioral observation—dissecting binaries, detonating samples, and understanding how threats operate at the code level.

Ghidra / Cutter / CAPE Sandbox
My complete malware analysis toolkit for reverse engineering, dynamic analysis, and behavioral observation—dissecting binaries, detonating samples, and understanding how threats operate at the code level.

Ghidra / Cutter / CAPE Sandbox
My complete malware analysis toolkit for reverse engineering, dynamic analysis, and behavioral observation—dissecting binaries, detonating samples, and understanding how threats operate at the code level.

Azure / GCP / AWS
My cloud security stack for protecting infrastructure—from Azure Security Center for posture management to Google Cloud Armor for DDoS protection and web application firewalls.

Azure / GCP / AWS
My cloud security stack for protecting infrastructure—from Azure Security Center for posture management to Google Cloud Armor for DDoS protection and web application firewalls.

Azure / GCP / AWS
My cloud security stack for protecting infrastructure—from Azure Security Center for posture management to Google Cloud Armor for DDoS protection and web application firewalls.









Recent Achievements
A track record of technical excellence. From securing winners at National hackathons to unveiling novel research at global summits.



Hi
Hi
Hi
Let's work together
Let's build something secure together, whether it's implementing a SIEM, responding to an incident, or developing custom security tools.
About me
Aditya Singh
I'm a cybersecurity analyst and threat researcher passionate about defending organizations against sophisticated cyber threats and advancing security through research.
With hands-on experience in incident response, malware analysis, and security engineering, I bridge the gap between threat intelligence and defensive operations through custom tooling, forensic investigation, and strategic security implementations.
what I can do for you
As a cybersecurity analyst, I am a digital defender, building robust security infrastructures that protect organizations and uncover hidden threats.
1. Threat Detection & Analysis
SIEM implementation and monitoring
Malware analysis and reverse engineering
Decrease Noise
Network traffic analysis
2. Incident Response
Logo and brand identity design
Social media graphics and ad creatives
Infographics and data visualization
Custom illustrations and icons
3. Security Engineering
Responsive website design
Landing page design and optimization
Webflow development and customization
Website maintenance and updates
4. Research & Development
Brand strategy and identity development
Visual style guide creation
Typography and color scheme selection
Brand storytelling and messaging
1. Threat Detection & Analysis
SIEM implementation and monitoring
Malware analysis and reverse engineering
Decrease Noise
Network traffic analysis
2. Incident Response
Logo and brand identity design
Social media graphics and ad creatives
Infographics and data visualization
Custom illustrations and icons
3. Security Engineering
Responsive website design
Landing page design and optimization
Webflow development and customization
Website maintenance and updates
4. Research & Development
Brand strategy and identity development
Visual style guide creation
Typography and color scheme selection
Brand storytelling and messaging
1. Threat Detection & Analysis
SIEM implementation and monitoring
Malware analysis and reverse engineering
Decrease Noise
Network traffic analysis
2. Incident Response
Logo and brand identity design
Social media graphics and ad creatives
Infographics and data visualization
Custom illustrations and icons
3. Security Engineering
Responsive website design
Landing page design and optimization
Webflow development and customization
Website maintenance and updates
4. Research & Development
Brand strategy and identity development
Visual style guide creation
Typography and color scheme selection
Brand storytelling and messaging
DISCOVER MY JOURNEY IN CYBERSECURITY
From curious technology enthusiast to cybersecurity professional, my path has been shaped by a passion for understanding cyber threats and building secure digital environments, blending threat intelligence, incident response, malware analysis, and security research into every project.
Senior Security Researcher
Siemens Healthineers
Feb. 2026 - Present
Senior Security Researcher
Siemens Healthineers
Feb. 2026 - Present
Senior Security Researcher
Siemens Healthineers
Feb. 2026 - Present
Security Researcher
Turtleneck Systems
May 2024 - Feb. 2026
Security Researcher
Turtleneck Systems
May 2024 - Feb. 2026
Security Researcher
Turtleneck Systems
May 2024 - Feb. 2026
CYBERSECURITY ANALYST
Plutos One Technology
Sept 2023 - May 2024
CYBERSECURITY ANALYST
Plutos One Technology
Sept 2023 - May 2024
CYBERSECURITY ANALYST
Plutos One Technology
Sept 2023 - May 2024
THREAT ANALYST INTERN
NCIIPC
July 2023 - Sept 2023
THREAT ANALYST INTERN
NCIIPC
July 2023 - Sept 2023
THREAT ANALYST INTERN
NCIIPC
July 2023 - Sept 2023
RESEARCH COLLABORATOR
IIT Bombay
May 2024 - July 2024
RESEARCH COLLABORATOR
IIT Bombay
May 2024 - July 2024
RESEARCH COLLABORATOR
IIT Bombay
May 2024 - July 2024
My Tech Stack
I work across the security stack, Python for automation, Wazuh and Splunk for monitoring, Azure and GCP for cloud defense, Ghidra and YARA for malware analysis. Each tool is chosen to detect threats faster and respond more effectively.

Python / Bash / Powershell
My primary language for building security tools, automation scripts, and malware analysis frameworks, powerful, versatile, and essential for incident response.

Python / Bash / Powershell
My primary language for building security tools, automation scripts, and malware analysis frameworks, powerful, versatile, and essential for incident response.

Python / Bash / Powershell
My primary language for building security tools, automation scripts, and malware analysis frameworks, powerful, versatile, and essential for incident response.

Wazuh / Splunk / ELK Stack
My go-to SIEM platforms for log analysis, threat detection, and security monitoring—real-time visibility into what's happening across the infrastructure.

Wazuh / Splunk / ELK Stack
My go-to SIEM platforms for log analysis, threat detection, and security monitoring—real-time visibility into what's happening across the infrastructure.

Wazuh / Splunk / ELK Stack
My go-to SIEM platforms for log analysis, threat detection, and security monitoring—real-time visibility into what's happening across the infrastructure.

Microsoft Defender Suite
Enterprise-grade endpoint protection and threat intelligence platform I use for detecting and responding to advanced threats across Windows environments

Microsoft Defender Suite
Enterprise-grade endpoint protection and threat intelligence platform I use for detecting and responding to advanced threats across Windows environments

Microsoft Defender Suite
Enterprise-grade endpoint protection and threat intelligence platform I use for detecting and responding to advanced threats across Windows environments

Yara
My signature-based malware detection tool—perfect for creating custom rules to identify and classify threats during forensic investigations.

Yara
My signature-based malware detection tool—perfect for creating custom rules to identify and classify threats during forensic investigations.

Yara
My signature-based malware detection tool—perfect for creating custom rules to identify and classify threats during forensic investigations.

Ghidra / Cutter / CAPE Sandbox
My complete malware analysis toolkit for reverse engineering, dynamic analysis, and behavioral observation—dissecting binaries, detonating samples, and understanding how threats operate at the code level.

Ghidra / Cutter / CAPE Sandbox
My complete malware analysis toolkit for reverse engineering, dynamic analysis, and behavioral observation—dissecting binaries, detonating samples, and understanding how threats operate at the code level.

Ghidra / Cutter / CAPE Sandbox
My complete malware analysis toolkit for reverse engineering, dynamic analysis, and behavioral observation—dissecting binaries, detonating samples, and understanding how threats operate at the code level.

Azure / GCP / AWS
My cloud security stack for protecting infrastructure—from Azure Security Center for posture management to Google Cloud Armor for DDoS protection and web application firewalls.

Azure / GCP / AWS
My cloud security stack for protecting infrastructure—from Azure Security Center for posture management to Google Cloud Armor for DDoS protection and web application firewalls.

Azure / GCP / AWS
My cloud security stack for protecting infrastructure—from Azure Security Center for posture management to Google Cloud Armor for DDoS protection and web application firewalls.









Recent Achievements
A track record of technical excellence. From securing winners at National hackathons to unveiling novel research at global summits.



Hi
Hi
Hi
Let's work together
Let's build something secure together, whether it's implementing a SIEM, responding to an incident, or developing custom security tools.



