🎓 Third-year Information Security student at PTIT (Posts and Telecommunications Institute of Technology)
💼 Aspiring SOC / Incident Response Engineer
⚙️ Hands-on experience in DFIR, Threat Hunting, Reverse Engineering, and Malware Analysis
📍 Based in Vietnam 🇻🇳 | Open for internship opportunities in SOC / Blue Team / DFIR
I have been sharpening my skills and knowledge through domestic and international CTF competitions, hands-on projects, and continuous learning.
“Continuous improvement is Kaizen — I apply it in security, learning, and life.”
- Practicing malware analysis (Covenant C2, InfoStealer, Valyria, BlackLotus)
- Developing detection pipelines for C2 traffic, persistence artifacts, and memory forensics
- Sharing research and notes at my KAiZ3n Blog
- Always learning: Blue Team tactics, DFIR automation, and AI-assisted detection
| Domain | Tools / Frameworks |
|---|---|
| Incident Response | Volatility3, KAPE, pypykatz, Autopsy, DFIR-Orc |
| Network Analysis | Suricata, Wireshark, NetworkMiner |
| Malware Analysis | IDA Pro, Ghidra, x64dbg, PEStudio, YARA |
| Development | Python, PowerShell, Bash, Go |
| Visualization / Reports | Power BI, Jupyter Notebook |
| OS Environments | Windows, Ubuntu Server, WSL2, VMware Workstation |
- My CV (PDF)
- Email: [email protected]
- LinkedIn: Lam Tan Thong
- Blog: kaiz3n.github.io
- Motto: “Learn deeply, automate wisely, defend quietly.”
💡 I believe continuous learning and knowledge sharing are the keys to becoming better every day in cybersecurity.