I am Luís “lehelige” Dias, a cybersecurity professional and researcher dedicated to developing studies and content that influence society, making the internet a safer place for everyone — especially those without a technical background. Currently, my work focuses on Networking, Cryptography, Malware Analysis, and Forensics.
Technical Profile#
In my career, I strive to bridge the gap between operational practice and academic rigor. I am a Software Engineering undergraduate (class of 2027), with the goal of pursuing a Master’s and Ph.D. in the future. I believe that scientific research is the engine for real-world change — as seen in the legacy of technologies like Stent and Kerberos.
Certifications and Arsenal#
I hold the ISC² CC (Certified in Cybersecurity) and CompTIA Security+ certifications, as well as vendor-specific certifications from Fortinet (NSE 1, 2, 3, and 5 - FortiWeb). Currently, I am following an intense study routine focused on earning the CCD (CyberDefenders), GIAC GCFE, OffSec OSIR, and OSTH certifications.
I have been specializing in building threat analysis environments using FlareVM, Tsurugi Linux, SANS Sift, and REMnux. In these labs, I focus on memory forensics (Volatility and MemProcFS), Windows Internals, and incident response.
Ideals and Future Vision#
I believe computing is synonymous with progress, which requires a relentless pursuit of knowledge. I have a strong interest in CTF (Capture The Flag) competitions, particularly in Reverse Engineering and Forensics. My future plans include a degree in Applied and Computational Mathematics — complementing my current training and post-graduate research focused on Cryptography or Network Security, such as IP Multicast security.
Outside the terminal, I follow the Tactical Barbell training program. I believe that physical and mental preparedness go hand in hand; the resilience required for a malware analyst to debug complex binaries is the same required to complete an Ironman or the UTMB. I seek to progress in both fields with the same discipline.
Finally, why “Layer 8”?#
In the OSI model, the seventh layer is the application. “Layer 8” is us. It is where the most critical vulnerabilities reside and where true cybersecurity happens. Hardening a system begins with hardening human knowledge.
