$ whoami

Muhamad Faishol Hakim

DFIR Engineer — Digital Forensics & Incident Response

Cybersecurity professional with 3+ years of hands-on experience in blue team operations, specializing in digital forensics and incident response. Proven track record leading complex security investigations across Indonesia's state-owned enterprise sector, with expertise in malware analysis, evidence-based timeline reconstruction, and translating threat intelligence into actionable detection.

# experience
jan 2025 — present

Technical Consultant Associate

PT FPT Metrodata Indonesia (Metrodata Group)

  • Lead implementation and ongoing maintenance of enterprise security solutions — Tenable, Splunk, and Elastic — ensuring optimal deployment and operational continuity
  • Spearheaded 10+ DFIR engagements across SOE sectors including telecommunications, finance, manufacturing, and construction, serving as the primary technical investigator
  • Produced comprehensive incident reports encompassing full attack timelines, root cause analysis, and executive-level findings for ransomware, web breach, and cryptomining incidents
  • Conducted applied research in blue team tooling, advancing organizational capabilities across digital forensics, incident response, and cyber threat intelligence disciplines
feb 2024 — jan 2025

Technical Consultant Associate

PT Mitra Integrasi Informatika (Metrodata Group)

  • Delivered end-to-end security product implementation and post-deployment support for enterprise clients, ensuring alignment with client security objectives
  • Conducted forensic investigations including evidence acquisition, chain-of-custody management, and structured incident timeline reconstruction for client-facing engagements
feb 2023 — feb 2024

Technical Consultant Analyst

PT Mitra Integrasi Informatika (Metrodata Group)

  • Conducted in-depth technical research on Splunk and Elastic, translating findings into practical blue team use cases that informed product implementation strategies
  • Developed and maintained comprehensive technical documentation to support product deployment, system configuration, and knowledge transfer across stakeholders
mar 2022 — feb 2023

Cyber Security Analyst (L1)

PT Visionet Data Internasional

  • Performed real-time security event monitoring and triage across SIEM, EDR, and IAM platforms, supporting concurrent client environments with high operational availability
  • Designed and delivered security awareness content and technical briefings to cross-functional stakeholders, strengthening the organization's security posture
# selected dfir cases

10+ incident investigations across state-owned enterprises. Client names confidential.

Web Breach
Telecom (SOE)
Linux Server Forensics
Ransomware
Manufacturing (SOE)
Windows Environment
Cryptomining
Food & Beverage (SOE)
Cloud Machine Forensics
Ransomware
Finance (SOE)
Windows Environment
Ransomware
Construction (SOE)
Windows Environment
Readiness Assessment
Financial Services
Pre-incident Readiness
# projects

dfir-autopilot

in progress

Automated DFIR triage pipeline — KAPE collection → artifact parsing → Hayabusa & DeepBlueCLI scanning → unified timeline visualization.

Python KAPE Hayabusa DeepBlueCLI

vol-autoparser

in progress

Volatility3 automation for Linux memory images — auto-detect kernel version, download ISF symbols, run all relevant plugins, and generate a summarized findings report.

Python Volatility3 Memory Forensics
# arsenal
SIEM & Monitoring
Splunk Elastic CrowdStrike Wazuh
DFIR
KAPE Velociraptor Volatility FTK Autopsy EZTools Hayabusa
Threat Intelligence
Recorded Future MISP OpenCTI
VA & BAS
Tenable Atomic Red Team
Dev
Python Bash Linux Windows
# certifications
Computer Hacking Forensic Investigator (CHFI) EC-Council
Splunk Enterprise Security Admin Splunk
Digital Forensic Essentials (DFE) EC-Council
Foundation Level Threat Intelligence Analyst CREST / APMG
Operationalizing MITRE ATT&CK AttackIQ
# competitions
KC7 CTF — KC7 Foundation 2nd place
Dragos CTF — ICS/OT Defense & DFIR 19th / 700+ teams
GEMASTIK — National Cyber Security top 7 · finalist (2x)
JOINTS UGM — Cyber Security CTF finalist (2x)
CBD — Cyber Security CTF finalist
# writing

Previously on Medium. Migrating here. → all posts

Automating DFIR Triage with KAPE and Timeline Analysis

Building a pipeline from triage collection to interactive timeline.

Volatility Module Auto-Parser for Linux Memory Images

Automating the painful parts of Linux memory forensics.

Building a CTI Enrichment Pipeline: From Reports to Detection

End-to-end IoC extraction, enrichment, and detection deployment.