Cybersecurity professional specializing in SOC leadership, threat hunting, cyber threat intelligence, and attack surface management. I build efficient, intelligence-driven security operations that go beyond alert monitoring to deliver real-world threat mitigation.
"Cybersecurity is more than tools — it's a strategy."
- Threat Hunting & Incident Analysis — Identify hidden threats and attacker behavior before incidents escalate
- SOC Strategy & Development — Design efficient SOC frameworks to improve detection, response, and operations
- Cyber Threat Intelligence & OSINT — Turn intelligence into actionable insights for decisions and adversary tracking
- Cloud Security & Attack Surface Management — Secure cloud environments, reduce misconfigurations, minimize exposure
- Security Automation & Process Optimization — Use automation and analytics to boost efficiency and reduce false positives
| Project | Description |
|---|---|
| MacFIRE | macOS DFIR collection & imaging toolkit: timeline, memory, rootkit checks, HTML reporting |
| Aegis | Windows-friendly single-file Python web app for URL recon, OSINT enrichment, subdomain intel |
| ExpertXSS | Python XSS scanner that fetches the latest payloads automatically |
| ExpertRecon | Recon & exploitation helper integrating multi-tech discovery and third-party APIs |
| No-Secret-Scan | Find exposed secrets / hard-coded credentials in web pages |
| No-Secret-Scan for GitHub/GitLab | Scan repos for API keys and tokens across history |
| uclsoc_code | Curated SIEM detection logic library mapped by domain & framework |
| Kalitellingence | One-shot Kali setup for Threat Intel & dark-web workflows |
flowchart TD
A["Collect Signals"] --> B["Enrich: WHOIS · OSINT · VT · Shodan"]
B --> C["Detect and Correlate: SIEM rules · UEBA"]
C --> D{"Suspicious"}
D -- "Yes" --> E["Hunt Loop: pivot → query → timeline"]
D -- "No" --> H["Autoclose and Tune Rules"]
E --> F["Triage and Contain"]
F --> G["Incident Response: Mitigate and Eradicate"]
G --> I["Lessons Learned"]
I --> J["Automate: SOAR XSOAR · scripts"]
J --> C
flowchart LR
Me(("Riyan Pratama"))
Me --> MacFIRE["MacFIRE"]
Me --> ExpertXSS["ExpertXSS"]
Me --> ExpertRecon["ExpertRecon"]
Me --> Aegis["Aegis"]
Me --> NSS["No Secret Scan"]
Me --> NSSGL["No Secret Scan GitHub GitLab"]
Me --> UCLS["uclsoc_code"]
Me -.-> PY["Python"]
Me -.-> PHP["PHP"]
Me -.-> JS["JavaScript"]
Me -.-> TW["Tailwind CSS"]
MacFIRE --> PY
ExpertXSS --> PY
ExpertRecon --> PY
Aegis --> PY
Aegis --> JS
NSS --> JS
NSSGL --> JS
UCLS --> PY
🔐 Security ██████████████████████░░ 90%
🕵️ Threat Hunting ██████████████████████░░ 90%
🛡️ SIEM █████████████████████░░░ 85%
🔍 OSINT ████████████████████░░░░ 80%
🧪 Incident Response █████████████████████░░░ 85%
🖥️ Network Security ████████████████████░░░░ 80%
- Owner of Wedusku Farm (goat farmer 🐐)
- Expert in ngarit (traditional grass cutting for animal feed)
- I build security solutions while nurturing my farm

