Qualifications Expertise in threat identification, with the ability to accurately pinpoint malicious code and classify all categories of malicious applications. Proficient in industry‑recognized reverse‑engineering tools such as IDA Pro and Ghidra, along with complementary open‑source utilities, to