ATTACKAXIS
High-fidelity adversarial simulation engine. Generates realistic SOC telemetry from MITRE ATT&CK STIX data. Includes stateful breach tracks and 50+ false-positive scenarios. SIEM-ready export (CEF, LEEF, JSONL, Syslog).
// AUTHENTICATED_BY_OPERATOR: CHIEF

I started hacking in 9th grade - because I wanted to know how systems break. That curiosity never left.
Thirteen years later I architect threat detection infrastructure, own security products from first principles to market, and have been in the rooms where it matters - IR war rooms, international conference stages, national cybersecurity policy tables, and C-suite discussions on product strategy and market direction.
"My work sits at an intersection most people choose one side of: deep engineering and operational leadership. I chose both."
Tracing system lineage across 13 years
AttackFence TechLabs · Apr 2022 – Present
"Engineered automated correlation of disparate alerts into unified, actionable attack narratives."
AttackFence TechLabs · Jul 2021 – Apr 2022
"Achieved 87% reduction in storage and 300% improvement in search latency through database modernization."
ACPL Systems Pvt. Ltd. · Jul 2019 – Jul 2021
"Reduced Mean Time to Detect (MTTD) by 60% through automated hunting pipelines."
ACPL Systems Pvt. Ltd. · Jun 2018 – Jul 2019
"Improved team productivity by 60% via automated cross-vendor threat response integration."
AttackFence TechLabs operates as the product R&D sister concern of ACPL Systems.
High-fidelity adversarial simulation engine. Generates realistic SOC telemetry from MITRE ATT&CK STIX data. Includes stateful breach tracks and 50+ false-positive scenarios. SIEM-ready export (CEF, LEEF, JSONL, Syslog).
LLM-powered portfolio intelligence system. Tracks investment themes and dynamic risk exposure against real-time geopolitical and macroeconomic context. Automated sentiment analysis on global news feeds.




Whether it's a hard engineering problem, a product that needs building, or a threat that needs understanding. If the work is interesting, I'm interested.
Get a comprehensive PDF summary of operational history, capability matrix, and technical certifications.
Encryption active. Inbound signals are prioritized based on technical complexity and strategic alignment.