Cybersecurity professional specializing in SOC leadership, threat hunting, cyber threat intelligence, and attack surface management. I build efficient, intelligence-driven security operations that go beyond alert monitoring to deliver real-world threat mitigation.
"Cybersecurity is more than tools β itβs a strategy."
- MacFIRE β macOS DFIR collection & imaging toolkit: timeline, memory, rootkit checks, HTML reporting.
- Aegis β Windows-friendly single-file Python web app for URL recon, OSINT enrichment, subdomain intel, history & exports.
- ExpertXSS β Python XSS scanner that fetches the latest payloads automatically.
- ExpertRecon β Recon & exploitation helper integrating multi-tech discovery and third-party APIs.
- No-Secret-Scan β Find exposed secrets / hard-coded credentials in web pages.
- No-Secret-Scan for GitHub/GitLab β Scan repos for API keys and tokens across history.
- uclsoc_code β Curated SIEM detection logic library mapped by domain & framework.
- Kalitellingence β One-shot Kali setup for Threat Intel & dark-web workflows.
- Threat Hunting & Incident Analysis β Identify hidden threats and attacker behavior before incidents escalate.
- SOC Strategy & Development β Design efficient SOC frameworks to improve detection, response, and operations.
- Cyber Threat Intelligence & OSINT β Turn intelligence into actionable insights for decisions and adversary tracking.
- Cloud Security & Attack Surface Management β Secure cloud environments, reduce misconfigurations, minimize exposure.
- Security Automation & Process Optimization β Use automation and analytics to boost efficiency and reduce false positives.
GitHub tip: use quoted labels like
A["Text"]
to avoid parser errors with special characters.
pie title Primary Tech Stack
"Python" : 40
"PHP" : 25
"JavaScript" : 25
"Tailwind CSS" : 10
flowchart TD
A["Collect Signals"] --> B["Enrich: WHOIS Β· OSINT Β· VT Β· Shodan"]
B --> C["Detect and Correlate: SIEM rules Β· UEBA"]
C --> D{"Suspicious"}
D -- "Yes" --> E["Hunt Loop: pivot β query β timeline"]
D -- "No" --> H["Autoclose and Tune Rules"]
E --> F["Triage and Contain"]
F --> G["Incident Response: Mitigate and Eradicate"]
G --> I["Lessons Learned"]
I --> J["Automate: SOAR XSOAR Β· scripts"]
J --> C
gantt
title 2025 Roadmap (Illustrative)
dateFormat YYYY-MM-DD
axisFormat %b %d
section Aegis
Subdomain Intelligence :active, a1, 2025-06-01, 30d
Tailwind UI Redesign :a2, after a1, 20d
section MacFIRE
Memory Forensics Module :m1, 2025-07-10, 25d
HTML Report v2 :m2, after m1, 20d
section ExpertXSS
Payload Auto Update :x1, 2025-05-20, 15d
CI CD and Tests :x2, after x1, 20d
flowchart LR
Me(("Riyan Pratama"))
Me --> MacFIRE["MacFIRE"]
Me --> ExpertXSS["ExpertXSS"]
Me --> ExpertRecon["ExpertRecon"]
Me --> Aegis["Aegis"]
Me --> NSS["No Secret Scan"]
Me --> NSSGL["No Secret Scan GitHub GitLab"]
Me --> UCLS["uclsoc_code"]
Me -.-> PY["Python"]
Me -.-> PHP["PHP"]
Me -.-> JS["JavaScript"]
Me -.-> TW["Tailwind CSS"]
MacFIRE --> PY
ExpertXSS --> PY
ExpertRecon --> PY
Aegis --> PY
Aegis --> JS
NSS --> JS
NSSGL --> JS
UCLS --> PY
π Security ββββββββββββββββββββββββ 90%
π΅οΈ Threat Hunting ββββββββββββββββββββββββ 90%
π‘οΈ SIEM ββββββββββββββββββββββββ 85%
π OSINT ββββββββββββββββββββββββ 80%
π§ͺ Incident Response ββββββββββββββββββββββββ 85%
π₯οΈ Network Security ββββββββββββββββββββββββ 80%
- Owner of Wedusku Farm (goat farmer π)
- Expert in ngarit (traditional grass cutting for animal feed)
- I build security solutions while nurturing my farm