G3tSyst3m’s Infosec Research and Development blog:

Security Leader, Security Researcher and all around Cyber Enthusiast. I’m fairly low profile, but try and share useful info from time to time. I’ve worked in Infosec for over a decade, and have an (ISC)2 CISSP certification. My programming fluency is centered around Python, C/C++, and x86/x64 assembly. I am self-taught and to prove that, I got my bacherlor’s degree in Music. So yeah…there’s that. 😸 I’ve worked in Healthcare and Higher Education, though most of my experience has primarily been in Higher Education. I’ve also been involved (and continue to be involved) in freelance/consulting work as the opportunity arises (This blog has helped considerably in that respect). I’d very much like to do security research full time if and when the opportunity arises. If anyone reads this and thinks,”hmm, maybe we should give this dude a shot and reach out to him. He seems pretty chill and also comes across as a die hard nerd who likes low level windows internals, etc.” Yeah, you pretty much nailed it. That’s me.

Seriously though, I do this for fun. Every spare minute I get if I’m not at work, and I’m not writing music, I’m doing offsec research. I live and breathe what I do. So, let the blog serve as my resume. If you are in the position of being able to recruit or you are someone who already works in offsec and want to help pass along my info to your crew, please let me know!

The focus on this blog will largely be on offensive security tools and malware research. Outside of the blog, I also share detailed, on-demand video walkthroughs, breaking down tools and concepts shared throughout several of my blog posts via my ko-fi membership. 😸 I also share exclusive content not on my blog via ko-fi.

ko-fi membership offering

You can also find me on X: g3tsyst3m

As I mentioned earlier. I’m also available to do consultation work and always considering prospective job opportunities. If you have something you would like to collaborate on or interested in discussing work opportunities, please do reach out! The info below can be considered the abridged version of my CV for those interested:

  • Dedicated and results-driven information security leader with 12 years of experience designing and implementing comprehensive cybersecurity strategies in Healthcare and Higher Education. I lead a team of on-site and managed services security engineers, driving proactive threat management / threat detection/monitoring, incident response, and compliance with industry frameworks such as NIST, ISO 27001, and PCI DSS.

  • My expertise spans threat intelligence / threat detection / threat hunting, penetration testing, malware analysis/reverse engineering, and vulnerability / risk assessments. Skilled in leveraging cloud technologies to enhance security architectures, I collaborate seamlessly with key stakeholders to align security initiatives with organizational goals, ensuring resilience in an ever-evolving threat landscape.

  • Certifications: CISSP, CCNA

  • Skills: Python, C/C++, PHP, x86/x64 assembly, JavaScript, Powershell, Application security, Network Security, Security Architecture, Vulnerability Scanning, penetration testing, IDS, IPS, Microsoft DLP, static/dynamic analysis / reverse engineering, Azure, AWS, Elastic SIEM

  • Soft Skills: adaptable to fast paced environments, collaborative, team leader, results oriented, problem solver.

I also contribute to researching software vulnerabilities:

Latest:

(I was among a few other researchers that discovered this Elevation of Privilege vuln with Microsoft’s SDK):

https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-47962

Here’s one for MSI’s software:

https://g3tsyst3m.github.io/cve/msi/Arbitrary-Write-Privilege-Escalation-CVE-2024-50804

Archived: exploit-db.com

Also co-wrote a Metasploit module:

metasploit module

cve link