- Profile: Reverse engineer with experience in malware analysis and cyber threat intelligence.
- Expertise: Solid technical foundation in low-level OS internals and x86/x64 disassembly.
- Impact: Practical experience in reverse-engineering malware to extract actionable intelligence, engineer detection rules, and profile Threat Actor TTPs.
-
Accenture Security | Rome, Italy | Senior Security Analyst (2023 – Present)
- Analyzed malicious payloads and suspicious binaries to support proactive threat detection capabilities.
- Extracted C2 configurations and IOCs from malware samples to enrich enterprise threat intelligence feeds.
- Engineered high-fidelity YARA and detection rules for enterprise SIEM/EDR platforms to track emerging Threat Actor campaigns and minimize false positives.
- Analyzed obfuscated scripts (PowerShell, JavaScript) to identify initial access vectors and evasion techniques.
- Mapped adversary TTPs to the MITRE ATT&CK framework to profile Threat Actor behaviors.
-
Senato della Repubblica | Rome, Italy | Security Analyst (Intern) (2022 – 2023)
- Engineered and deployed custom detection rules for the enterprise SIEM to surface security anomalies and potential policy violations.
- Developed custom Python plugins and automation scripts to streamline security operations and integrate diverse log sources into the centralized monitoring pipeline.
- GIAC Reverse Engineering Malware (GREM) - Global Information Assurance Certification (2025)
- Professional Master in Cybersecurity – University of Bologna, Italy (2021)
- M.Sc. in Computer Engineering – Sapienza University of Rome, Italy (2020)
- B.Sc. in Computer Engineering – Sapienza University of Rome, Italy (2018)
- BinBench: a benchmark for x64 portable operating system interface binary function representations – PeerJ Computer Science (2023). Developed a framework for evaluating Machine Learning model generality across assembly-level analysis tasks.
- Reverse Engineering: IDA Pro, Ghidra, x64dbg, WinDbg, Radare2, Binary Ninja.
- Malware Analysis: Static/Dynamic Analysis, Unpacking, Deobfuscation, PE/COFF Structure, Config Extraction.
- Threat Intelligence & Detection: YARA, Wireshark, Suricata, MITRE ATT&CK.
- Programming & Scripting: Assembly (x86/x64), C/C++, Python, Bash, PowerShell.
- Operating Systems: Windows Internals, Linux Internals, Android.
I authorize the processing of my personal data pursuant to Italian Legislative Decree 196/2003 and the GDPR (EU Regulation 2016/679).
Download Public PDF Version
Download Public PDF Version
