Anuj Soni initially pursued a career fighting cybercrime for the thrill of the hunt. "The rush of tracking bad guys and gals, uncovering their tools, and understanding their motives is just way too fun," he says. "I simply can't get enough of it."
"Tools come and go, but if you develop a process that works for you and are patient with yourself, creativity will flow," he says. "Automate what can be automated and enjoy working through the hard stuff" - that is, the actual analysis.
Since entering the information security field in 2005, Anuj has performed numerous intrusion investigations to help government and commercial clients mitigate attacks against the enterprise. His malware hunting and technical analysis skills have resulted in the successful identification, containment, and remediation of multiple threat actor groups. Anuj has analyzed hundreds of malware samples to assess function, purpose, and impact, and his recommendations have improved the security posture of numerous organizations. Anuj excels not only in delivering rigorous forensic analysis, but also in process development, knowledge management, and team leadership to accelerate incident response efforts.
In addition to teaching SANS courses, Anuj frequently presents at industry events such as the U.S. Cyber Crime Conference, SANS DFIR Summit, and the Computer and Enterprise Investigations Conference (CEIC). He has bachelor's and master's degrees from Carnegie Mellon University and holds the certification in GIAC Reverse Engineering Malware (GREM)
When not consumed by the excitement of his day job, Anuj spends time with his growing family and enjoys photography, hitting the gym, and mixing up creative cocktails.
Get to Know Anuj Soni:
- More than a decade of experience performing forensic, malware, and network analysis
- Check out Anuj's blog at https://malwology.com/
- View Anuj's recent interview at the SANS Cyber Defense Initiative event in Washington, DC
Hear Anuj discuss how to perform code analysis with Ghidra:
ADDITIONAL CONTRIBUTIONS BY ANUJ SONI:
The State of Malware Analysis: Advice from the Trenches, September 2019
Malicious Payloads - Hiding Beneath the WAV
An Introduction To Code Analysis With Ghidra
InSecurity Podcast, The BlackBerry 2020 Threat Report