About me

Aditya Singh

I'm a cybersecurity analyst and threat researcher passionate about defending organizations against sophisticated cyber threats and advancing security through research.

With hands-on experience in incident response, malware analysis, and security engineering, I bridge the gap between threat intelligence and defensive operations through custom tooling, forensic investigation, and strategic security implementations.

what I can do for you

As a cybersecurity analyst, I am a digital defender, building robust security infrastructures that protect organizations and uncover hidden threats.

1. Threat Detection & Analysis

SIEM implementation and monitoring

Malware analysis and reverse engineering

Decrease Noise

Network traffic analysis

2. Incident Response

Logo and brand identity design

Social media graphics and ad creatives

Infographics and data visualization

Custom illustrations and icons

3. Security Engineering

Responsive website design

Landing page design and optimization

Webflow development and customization

Website maintenance and updates

4. Research & Development

Brand strategy and identity development

Visual style guide creation

Typography and color scheme selection

Brand storytelling and messaging

1. Threat Detection & Analysis

SIEM implementation and monitoring

Malware analysis and reverse engineering

Decrease Noise

Network traffic analysis

2. Incident Response

Logo and brand identity design

Social media graphics and ad creatives

Infographics and data visualization

Custom illustrations and icons

3. Security Engineering

Responsive website design

Landing page design and optimization

Webflow development and customization

Website maintenance and updates

4. Research & Development

Brand strategy and identity development

Visual style guide creation

Typography and color scheme selection

Brand storytelling and messaging

1. Threat Detection & Analysis

SIEM implementation and monitoring

Malware analysis and reverse engineering

Decrease Noise

Network traffic analysis

2. Incident Response

Logo and brand identity design

Social media graphics and ad creatives

Infographics and data visualization

Custom illustrations and icons

3. Security Engineering

Responsive website design

Landing page design and optimization

Webflow development and customization

Website maintenance and updates

4. Research & Development

Brand strategy and identity development

Visual style guide creation

Typography and color scheme selection

Brand storytelling and messaging

DISCOVER MY JOURNEY IN CYBERSECURITY

From curious technology enthusiast to cybersecurity professional, my path has been shaped by a passion for understanding cyber threats and building secure digital environments, blending threat intelligence, incident response, malware analysis, and security research into every project.

Senior Security Researcher

Siemens Healthineers

Feb. 2026 - Present

Senior Security Researcher

Siemens Healthineers

Feb. 2026 - Present

Senior Security Researcher

Siemens Healthineers

Feb. 2026 - Present

Security Researcher

Turtleneck Systems

May 2024 - Feb. 2026

Security Researcher

Turtleneck Systems

May 2024 - Feb. 2026

Security Researcher

Turtleneck Systems

May 2024 - Feb. 2026

CYBERSECURITY ANALYST

Plutos One Technology

Sept 2023 - May 2024

CYBERSECURITY ANALYST

Plutos One Technology

Sept 2023 - May 2024

CYBERSECURITY ANALYST

Plutos One Technology

Sept 2023 - May 2024

THREAT ANALYST INTERN

NCIIPC

July 2023 - Sept 2023

THREAT ANALYST INTERN

NCIIPC

July 2023 - Sept 2023

THREAT ANALYST INTERN

NCIIPC

July 2023 - Sept 2023

RESEARCH COLLABORATOR

IIT Bombay

May 2024 - July 2024

RESEARCH COLLABORATOR

IIT Bombay

May 2024 - July 2024

RESEARCH COLLABORATOR

IIT Bombay

May 2024 - July 2024

My Tech Stack

I work across the security stack, Python for automation, Wazuh and Splunk for monitoring, Azure and GCP for cloud defense, Ghidra and YARA for malware analysis. Each tool is chosen to detect threats faster and respond more effectively.

Tech Logo

Python / Bash / Powershell

My primary language for building security tools, automation scripts, and malware analysis frameworks, powerful, versatile, and essential for incident response.

Tech Logo

Python / Bash / Powershell

My primary language for building security tools, automation scripts, and malware analysis frameworks, powerful, versatile, and essential for incident response.

Tech Logo

Python / Bash / Powershell

My primary language for building security tools, automation scripts, and malware analysis frameworks, powerful, versatile, and essential for incident response.

Wazuh / Splunk / ELK Stack

My go-to SIEM platforms for log analysis, threat detection, and security monitoring—real-time visibility into what's happening across the infrastructure.

Wazuh / Splunk / ELK Stack

My go-to SIEM platforms for log analysis, threat detection, and security monitoring—real-time visibility into what's happening across the infrastructure.

Wazuh / Splunk / ELK Stack

My go-to SIEM platforms for log analysis, threat detection, and security monitoring—real-time visibility into what's happening across the infrastructure.

Tech Logo

Microsoft Defender Suite

Enterprise-grade endpoint protection and threat intelligence platform I use for detecting and responding to advanced threats across Windows environments

Tech Logo

Microsoft Defender Suite

Enterprise-grade endpoint protection and threat intelligence platform I use for detecting and responding to advanced threats across Windows environments

Tech Logo

Microsoft Defender Suite

Enterprise-grade endpoint protection and threat intelligence platform I use for detecting and responding to advanced threats across Windows environments

Tech Logo

Yara

My signature-based malware detection tool—perfect for creating custom rules to identify and classify threats during forensic investigations.

Tech Logo

Yara

My signature-based malware detection tool—perfect for creating custom rules to identify and classify threats during forensic investigations.

Tech Logo

Yara

My signature-based malware detection tool—perfect for creating custom rules to identify and classify threats during forensic investigations.

Tech Logo

Ghidra / Cutter / CAPE Sandbox

My complete malware analysis toolkit for reverse engineering, dynamic analysis, and behavioral observation—dissecting binaries, detonating samples, and understanding how threats operate at the code level.

Tech Logo

Ghidra / Cutter / CAPE Sandbox

My complete malware analysis toolkit for reverse engineering, dynamic analysis, and behavioral observation—dissecting binaries, detonating samples, and understanding how threats operate at the code level.

Tech Logo

Ghidra / Cutter / CAPE Sandbox

My complete malware analysis toolkit for reverse engineering, dynamic analysis, and behavioral observation—dissecting binaries, detonating samples, and understanding how threats operate at the code level.

Tech Logo

Azure / GCP / AWS

My cloud security stack for protecting infrastructure—from Azure Security Center for posture management to Google Cloud Armor for DDoS protection and web application firewalls.

Tech Logo

Azure / GCP / AWS

My cloud security stack for protecting infrastructure—from Azure Security Center for posture management to Google Cloud Armor for DDoS protection and web application firewalls.

Tech Logo

Azure / GCP / AWS

My cloud security stack for protecting infrastructure—from Azure Security Center for posture management to Google Cloud Armor for DDoS protection and web application firewalls.

Recent Achievements

A track record of technical excellence. From securing winners at National hackathons to unveiling novel research at global summits.

Portrait of portfolio creator
Portrait of portfolio creator
Portrait of portfolio creator

Hi

Hi

Hi

Let's work together

Let's build something secure together, whether it's implementing a SIEM, responding to an incident, or developing custom security tools.

About me

Aditya Singh

I'm a cybersecurity analyst and threat researcher passionate about defending organizations against sophisticated cyber threats and advancing security through research.

With hands-on experience in incident response, malware analysis, and security engineering, I bridge the gap between threat intelligence and defensive operations through custom tooling, forensic investigation, and strategic security implementations.

what I can do for you

As a cybersecurity analyst, I am a digital defender, building robust security infrastructures that protect organizations and uncover hidden threats.

1. Threat Detection & Analysis

SIEM implementation and monitoring

Malware analysis and reverse engineering

Decrease Noise

Network traffic analysis

2. Incident Response

Logo and brand identity design

Social media graphics and ad creatives

Infographics and data visualization

Custom illustrations and icons

3. Security Engineering

Responsive website design

Landing page design and optimization

Webflow development and customization

Website maintenance and updates

4. Research & Development

Brand strategy and identity development

Visual style guide creation

Typography and color scheme selection

Brand storytelling and messaging

1. Threat Detection & Analysis

SIEM implementation and monitoring

Malware analysis and reverse engineering

Decrease Noise

Network traffic analysis

2. Incident Response

Logo and brand identity design

Social media graphics and ad creatives

Infographics and data visualization

Custom illustrations and icons

3. Security Engineering

Responsive website design

Landing page design and optimization

Webflow development and customization

Website maintenance and updates

4. Research & Development

Brand strategy and identity development

Visual style guide creation

Typography and color scheme selection

Brand storytelling and messaging

1. Threat Detection & Analysis

SIEM implementation and monitoring

Malware analysis and reverse engineering

Decrease Noise

Network traffic analysis

2. Incident Response

Logo and brand identity design

Social media graphics and ad creatives

Infographics and data visualization

Custom illustrations and icons

3. Security Engineering

Responsive website design

Landing page design and optimization

Webflow development and customization

Website maintenance and updates

4. Research & Development

Brand strategy and identity development

Visual style guide creation

Typography and color scheme selection

Brand storytelling and messaging

DISCOVER MY JOURNEY IN CYBERSECURITY

From curious technology enthusiast to cybersecurity professional, my path has been shaped by a passion for understanding cyber threats and building secure digital environments, blending threat intelligence, incident response, malware analysis, and security research into every project.

Senior Security Researcher

Siemens Healthineers

Feb. 2026 - Present

Senior Security Researcher

Siemens Healthineers

Feb. 2026 - Present

Senior Security Researcher

Siemens Healthineers

Feb. 2026 - Present

Security Researcher

Turtleneck Systems

May 2024 - Feb. 2026

Security Researcher

Turtleneck Systems

May 2024 - Feb. 2026

Security Researcher

Turtleneck Systems

May 2024 - Feb. 2026

CYBERSECURITY ANALYST

Plutos One Technology

Sept 2023 - May 2024

CYBERSECURITY ANALYST

Plutos One Technology

Sept 2023 - May 2024

CYBERSECURITY ANALYST

Plutos One Technology

Sept 2023 - May 2024

THREAT ANALYST INTERN

NCIIPC

July 2023 - Sept 2023

THREAT ANALYST INTERN

NCIIPC

July 2023 - Sept 2023

THREAT ANALYST INTERN

NCIIPC

July 2023 - Sept 2023

RESEARCH COLLABORATOR

IIT Bombay

May 2024 - July 2024

RESEARCH COLLABORATOR

IIT Bombay

May 2024 - July 2024

RESEARCH COLLABORATOR

IIT Bombay

May 2024 - July 2024

My Tech Stack

I work across the security stack, Python for automation, Wazuh and Splunk for monitoring, Azure and GCP for cloud defense, Ghidra and YARA for malware analysis. Each tool is chosen to detect threats faster and respond more effectively.

Tech Logo

Python / Bash / Powershell

My primary language for building security tools, automation scripts, and malware analysis frameworks, powerful, versatile, and essential for incident response.

Tech Logo

Python / Bash / Powershell

My primary language for building security tools, automation scripts, and malware analysis frameworks, powerful, versatile, and essential for incident response.

Tech Logo

Python / Bash / Powershell

My primary language for building security tools, automation scripts, and malware analysis frameworks, powerful, versatile, and essential for incident response.

Wazuh / Splunk / ELK Stack

My go-to SIEM platforms for log analysis, threat detection, and security monitoring—real-time visibility into what's happening across the infrastructure.

Wazuh / Splunk / ELK Stack

My go-to SIEM platforms for log analysis, threat detection, and security monitoring—real-time visibility into what's happening across the infrastructure.

Wazuh / Splunk / ELK Stack

My go-to SIEM platforms for log analysis, threat detection, and security monitoring—real-time visibility into what's happening across the infrastructure.

Tech Logo

Microsoft Defender Suite

Enterprise-grade endpoint protection and threat intelligence platform I use for detecting and responding to advanced threats across Windows environments

Tech Logo

Microsoft Defender Suite

Enterprise-grade endpoint protection and threat intelligence platform I use for detecting and responding to advanced threats across Windows environments

Tech Logo

Microsoft Defender Suite

Enterprise-grade endpoint protection and threat intelligence platform I use for detecting and responding to advanced threats across Windows environments

Tech Logo

Yara

My signature-based malware detection tool—perfect for creating custom rules to identify and classify threats during forensic investigations.

Tech Logo

Yara

My signature-based malware detection tool—perfect for creating custom rules to identify and classify threats during forensic investigations.

Tech Logo

Yara

My signature-based malware detection tool—perfect for creating custom rules to identify and classify threats during forensic investigations.

Tech Logo

Ghidra / Cutter / CAPE Sandbox

My complete malware analysis toolkit for reverse engineering, dynamic analysis, and behavioral observation—dissecting binaries, detonating samples, and understanding how threats operate at the code level.

Tech Logo

Ghidra / Cutter / CAPE Sandbox

My complete malware analysis toolkit for reverse engineering, dynamic analysis, and behavioral observation—dissecting binaries, detonating samples, and understanding how threats operate at the code level.

Tech Logo

Ghidra / Cutter / CAPE Sandbox

My complete malware analysis toolkit for reverse engineering, dynamic analysis, and behavioral observation—dissecting binaries, detonating samples, and understanding how threats operate at the code level.

Tech Logo

Azure / GCP / AWS

My cloud security stack for protecting infrastructure—from Azure Security Center for posture management to Google Cloud Armor for DDoS protection and web application firewalls.

Tech Logo

Azure / GCP / AWS

My cloud security stack for protecting infrastructure—from Azure Security Center for posture management to Google Cloud Armor for DDoS protection and web application firewalls.

Tech Logo

Azure / GCP / AWS

My cloud security stack for protecting infrastructure—from Azure Security Center for posture management to Google Cloud Armor for DDoS protection and web application firewalls.

Recent Achievements

A track record of technical excellence. From securing winners at National hackathons to unveiling novel research at global summits.

Portrait of portfolio creator
Portrait of portfolio creator
Portrait of portfolio creator

Hi

Hi

Hi

Let's work together

Let's build something secure together, whether it's implementing a SIEM, responding to an incident, or developing custom security tools.

About me

Aditya Singh

I'm a cybersecurity analyst and threat researcher passionate about defending organizations against sophisticated cyber threats and advancing security through research.

With hands-on experience in incident response, malware analysis, and security engineering, I bridge the gap between threat intelligence and defensive operations through custom tooling, forensic investigation, and strategic security implementations.

what I can do for you

As a cybersecurity analyst, I am a digital defender, building robust security infrastructures that protect organizations and uncover hidden threats.

1. Threat Detection & Analysis

SIEM implementation and monitoring

Malware analysis and reverse engineering

Decrease Noise

Network traffic analysis

2. Incident Response

Logo and brand identity design

Social media graphics and ad creatives

Infographics and data visualization

Custom illustrations and icons

3. Security Engineering

Responsive website design

Landing page design and optimization

Webflow development and customization

Website maintenance and updates

4. Research & Development

Brand strategy and identity development

Visual style guide creation

Typography and color scheme selection

Brand storytelling and messaging

1. Threat Detection & Analysis

SIEM implementation and monitoring

Malware analysis and reverse engineering

Decrease Noise

Network traffic analysis

2. Incident Response

Logo and brand identity design

Social media graphics and ad creatives

Infographics and data visualization

Custom illustrations and icons

3. Security Engineering

Responsive website design

Landing page design and optimization

Webflow development and customization

Website maintenance and updates

4. Research & Development

Brand strategy and identity development

Visual style guide creation

Typography and color scheme selection

Brand storytelling and messaging

1. Threat Detection & Analysis

SIEM implementation and monitoring

Malware analysis and reverse engineering

Decrease Noise

Network traffic analysis

2. Incident Response

Logo and brand identity design

Social media graphics and ad creatives

Infographics and data visualization

Custom illustrations and icons

3. Security Engineering

Responsive website design

Landing page design and optimization

Webflow development and customization

Website maintenance and updates

4. Research & Development

Brand strategy and identity development

Visual style guide creation

Typography and color scheme selection

Brand storytelling and messaging

DISCOVER MY JOURNEY IN CYBERSECURITY

From curious technology enthusiast to cybersecurity professional, my path has been shaped by a passion for understanding cyber threats and building secure digital environments, blending threat intelligence, incident response, malware analysis, and security research into every project.

Senior Security Researcher

Siemens Healthineers

Feb. 2026 - Present

Senior Security Researcher

Siemens Healthineers

Feb. 2026 - Present

Senior Security Researcher

Siemens Healthineers

Feb. 2026 - Present

Security Researcher

Turtleneck Systems

May 2024 - Feb. 2026

Security Researcher

Turtleneck Systems

May 2024 - Feb. 2026

Security Researcher

Turtleneck Systems

May 2024 - Feb. 2026

CYBERSECURITY ANALYST

Plutos One Technology

Sept 2023 - May 2024

CYBERSECURITY ANALYST

Plutos One Technology

Sept 2023 - May 2024

CYBERSECURITY ANALYST

Plutos One Technology

Sept 2023 - May 2024

THREAT ANALYST INTERN

NCIIPC

July 2023 - Sept 2023

THREAT ANALYST INTERN

NCIIPC

July 2023 - Sept 2023

THREAT ANALYST INTERN

NCIIPC

July 2023 - Sept 2023

RESEARCH COLLABORATOR

IIT Bombay

May 2024 - July 2024

RESEARCH COLLABORATOR

IIT Bombay

May 2024 - July 2024

RESEARCH COLLABORATOR

IIT Bombay

May 2024 - July 2024

My Tech Stack

I work across the security stack, Python for automation, Wazuh and Splunk for monitoring, Azure and GCP for cloud defense, Ghidra and YARA for malware analysis. Each tool is chosen to detect threats faster and respond more effectively.

Tech Logo

Python / Bash / Powershell

My primary language for building security tools, automation scripts, and malware analysis frameworks, powerful, versatile, and essential for incident response.

Tech Logo

Python / Bash / Powershell

My primary language for building security tools, automation scripts, and malware analysis frameworks, powerful, versatile, and essential for incident response.

Tech Logo

Python / Bash / Powershell

My primary language for building security tools, automation scripts, and malware analysis frameworks, powerful, versatile, and essential for incident response.

Wazuh / Splunk / ELK Stack

My go-to SIEM platforms for log analysis, threat detection, and security monitoring—real-time visibility into what's happening across the infrastructure.

Wazuh / Splunk / ELK Stack

My go-to SIEM platforms for log analysis, threat detection, and security monitoring—real-time visibility into what's happening across the infrastructure.

Wazuh / Splunk / ELK Stack

My go-to SIEM platforms for log analysis, threat detection, and security monitoring—real-time visibility into what's happening across the infrastructure.

Tech Logo

Microsoft Defender Suite

Enterprise-grade endpoint protection and threat intelligence platform I use for detecting and responding to advanced threats across Windows environments

Tech Logo

Microsoft Defender Suite

Enterprise-grade endpoint protection and threat intelligence platform I use for detecting and responding to advanced threats across Windows environments

Tech Logo

Microsoft Defender Suite

Enterprise-grade endpoint protection and threat intelligence platform I use for detecting and responding to advanced threats across Windows environments

Tech Logo

Yara

My signature-based malware detection tool—perfect for creating custom rules to identify and classify threats during forensic investigations.

Tech Logo

Yara

My signature-based malware detection tool—perfect for creating custom rules to identify and classify threats during forensic investigations.

Tech Logo

Yara

My signature-based malware detection tool—perfect for creating custom rules to identify and classify threats during forensic investigations.

Tech Logo

Ghidra / Cutter / CAPE Sandbox

My complete malware analysis toolkit for reverse engineering, dynamic analysis, and behavioral observation—dissecting binaries, detonating samples, and understanding how threats operate at the code level.

Tech Logo

Ghidra / Cutter / CAPE Sandbox

My complete malware analysis toolkit for reverse engineering, dynamic analysis, and behavioral observation—dissecting binaries, detonating samples, and understanding how threats operate at the code level.

Tech Logo

Ghidra / Cutter / CAPE Sandbox

My complete malware analysis toolkit for reverse engineering, dynamic analysis, and behavioral observation—dissecting binaries, detonating samples, and understanding how threats operate at the code level.

Tech Logo

Azure / GCP / AWS

My cloud security stack for protecting infrastructure—from Azure Security Center for posture management to Google Cloud Armor for DDoS protection and web application firewalls.

Tech Logo

Azure / GCP / AWS

My cloud security stack for protecting infrastructure—from Azure Security Center for posture management to Google Cloud Armor for DDoS protection and web application firewalls.

Tech Logo

Azure / GCP / AWS

My cloud security stack for protecting infrastructure—from Azure Security Center for posture management to Google Cloud Armor for DDoS protection and web application firewalls.

Recent Achievements

A track record of technical excellence. From securing winners at National hackathons to unveiling novel research at global summits.

Portrait of portfolio creator
Portrait of portfolio creator
Portrait of portfolio creator

Hi

Hi

Hi

Let's work together

Let's build something secure together, whether it's implementing a SIEM, responding to an incident, or developing custom security tools.

Create a free website with Framer, the website builder loved by startups, designers and agencies.