I’m a security engineer who likes building things, breaking things, and figuring out how they work. Most of my work has been around detection engineering, automation, and making systems more reliable and secure.

I’ve worked on everything from rule validation frameworks and metrics dashboards to internal tooling and secure microservices. I care about clarity, fast feedback, and making security easier to trust.

Outside of work, I spend time in my homelab messing with ZFS, pfSense, and ESXi. I like low-level security challenges, malware analysis, and CTF-style problems. I’m currently preparing for the OSCP and sharpening my skills in exploit dev and reverse engineering.


What I’m into right now

  • Automating detection QA with simulated logs and alert checks
  • Practicing buffer overflows and shellcoding for OSCP
  • Breaking stuff in lab environments and writing code to fix it
  • Reverse engineering basic malware with Ghidra

Long-term goals

I’d like to lead a detection or offensive security team, build tools that actually get used, and eventually publish some research if the opportunity comes up. I’m especially interested in purple teaming and building smarter ways to test and improve detections.


Contact

You can reach me at contact@mehulvaghani.com,
connect on LinkedIn,
or check out the blog for things I’m working on.