A security engineer's toolkit — built through hands-on practice, research, and relentless curiosity.
Writing Python and Bash to automate security workflows, build tooling, and orchestrate SOAR playbooks.
Penetration testing, ethical hacking, and vulnerability exploitation — understanding threats from the attacker's perspective.
Static and dynamic malware analysis, reverse engineering techniques, and threat intelligence research.
Securing AWS environments, hardening IAM configurations, and building security into CI/CD pipelines.
SIEM operations, log analysis, incident investigation, and response playbooks aligned to MITRE ATT&CK.
Implementing and auditing security frameworks across enterprise environments to manage risk effectively.
The best security practitioners never stop studying. Here's what's in my lab right now.
Offensive Security Certified Professional — the gold standard in penetration testing.
Deep-diving into static and dynamic analysis, assembly basics, and reverse engineering tooling.
Certified Ethical Hacker — systematic methodology for pen testing and vulnerability assessment.
Advanced cloud security architecture, threat modelling, and AWS-native defensive services.
Communicating security risks clearly to both technical and non-technical stakeholders across teams.
Confident communicator — from incident reports and security briefings to awareness campaigns.
Structured planning and execution for security engagements, research, and compliance projects.
Methodical and creative — breaking down complex security challenges to find actionable solutions.
Security threats evolve fast. Staying sharp, learning continuously, and pivoting quickly is second nature.
Passionate about building security culture through training, writing, and making complex topics accessible.
Check out my portfolio for real-world projects, or get in touch to discuss how I can contribute to your team.