The tools I use to break systems. Built through real engagements, CTF competitions, and hands-on lab work, not just coursework.
Writing Python and Bash to automate security workflows, build tooling, and orchestrate SOAR playbooks.
Penetration testing, ethical hacking, and vulnerability exploitation, understanding threats from the attacker's perspective.
Static and dynamic malware analysis, reverse engineering techniques, and threat intelligence research.
Securing AWS environments, hardening IAM configurations, and building security into CI/CD pipelines.
SIEM operations, log analysis, incident investigation, and response playbooks aligned to MITRE ATT&CK.
Implementing and auditing security frameworks across enterprise environments to manage risk effectively.
The best security practitioners never stop studying. Here's what's in my lab right now.
Offensive Security Certified Professional, the gold standard in penetration testing.
Deep-diving into static and dynamic analysis, assembly basics, and reverse engineering tooling.
Certified Ethical Hacker, covering systematic methodology for pen testing and vulnerability assessment.
Advanced cloud security architecture, threat modelling, and AWS-native defensive services.
Communicating security risks clearly to both technical and non-technical stakeholders across teams.
Confident communicator: from incident reports and security briefings to awareness campaigns.
Structured planning and execution for security engagements, research, and compliance projects.
Methodical and creative, breaking down complex security challenges to find actionable solutions.
Security threats evolve fast. Staying sharp, learning continuously, and pivoting quickly is second nature.
Every exploit I run gets documented. Published DFIR writeups, pentest reports, and CTF walkthroughs that show methodology, not just results.
Check out my portfolio for real-world projects, or get in touch to discuss how I can contribute to your team.