Specialized in offensive security, threat detection, and incident response. Breaking systems to build stronger defenses — from AD exploitation to SIEM-driven detection engineering.
I'm a cybersecurity analyst with deep expertise in offensive security and defensive operations. My work spans the full spectrum — from breaking into networks to building detection rules that catch attackers in the act.
On the offensive side, I specialize in network penetration testing, uncovering misconfigurations, lateral movement paths, and privilege escalation vectors. My web pentesting covers the full OWASP Top 10 and beyond — SQLi, XSS, SSRF, IDOR, and API abuse.
In the SOC, I leverage Splunk, SIEM platforms, and automation via n8n to triage alerts at scale, hunt threats proactively, and respond to incidents with speed and precision.
Active Directory is the backbone of most enterprise environments — and one of the most rewarding targets in a pentest engagement. My methodology covers the full kill chain: initial enumeration, credential attacks, privilege escalation, lateral movement, and domain compromise. I understand not just how to exploit AD, but how to defend, detect, and harden it at every tier.
Introductory cybersecurity certification covering security principles, threats, and defense fundamentals.
View Certificate ↗Cisco cybersecurity program covering SOC operations, threat analysis, and incident response.
View Certificate ↗Cloud computing fundamentals including AWS services, cloud architecture, and deployment models.
View Certificate ↗Demonstrates problem solving skills using algorithms, data structures, and logical thinking.
View Certificate ↗Networking fundamentals including IP addressing, routing, switching, and network protocols.
View Certificate ↗Advanced ethical hacking certification covering penetration testing tools and attack methodologies.
View Certificate ↗Network security certification covering cryptography, threat detection, and defense mechanisms.
View Certificate ↗Web application security testing using Burp Suite tools and vulnerability analysis.
View DetailsFocused on threat detection, behavioral analytics, incident response, and SIEM-based security monitoring.
View DetailsType help to see available commands.
Available for freelance pentesting engagements, SOC consulting, and security advisory roles. Drop a message — encrypted channels preferred.
SEND ENCRYPTED MESSAGE