🎓 Third-year Information Security student @ PTIT (Posts and Telecommunications Institute of Technology)
💼 Aspiring SOC / Incident Response Engineer
⚙️ Hands-on experience in DFIR, Threat Hunting, Reverse Engineering, and Malware Analysis
📍 Based in Vietnam 🇻🇳 | Open for internship opportunities in SOC / Blue Team / DFIR
“Continuous improvement is Kaizen — I apply it in security, learning, and life.”
- Building hands-on SOC labs with Splunk, Wazuh, Zeek, Suricata, Sysmon
- Practicing malware analysis (Covenant C2, InfoStealer, Valyria, BlackLotus)
- Developing detection pipelines for C2 traffic, persistence artifacts, and memory forensics
- Sharing research and notes at my KAiZ3n Blog
- Always learning: Blue Team tactics, DFIR automation, and AI-assisted detection
| Domain | Tools / Frameworks |
|---|---|
| Incident Response | Volatility3, KAPE, pypykatz, Autopsy, DFIR-Orc |
| Threat Hunting | Zeek, Suricata, Wireshark, SysmonView |
| Malware Analysis | IDA Pro, Ghidra, x64dbg, PEStudio, YARA |
| Development | Python, PowerShell, Bash, Go |
| Visualization / Reports | Power BI, Jupyter Notebook |
| OS Environments | Windows, Ubuntu Server, WSL2, VMware Workstation |
- My CV (PDF)
- Email: thongtan967@gmail.com
- LinkedIn: Lam Tan Thong
- Blog: kaiz3n.github.io
- Motto: “Learn deeply, automate wisely, defend quietly.”