I’m an offensive security specialist focused on adversary emulation, attack surface analysis, and exploitation of complex enterprise environments.
What I actually do
- Offensive security engagements - Web applications and APIs, infrastructure, Active Directory, cloud, and hybrid environments.
- Vulnerability research - Open-source and closed-source software.
- Tooling development - Building and adapting custom tooling for reconnaissance, initial access, lateral movement, and operational persistence.
- Red team infrastructure - Designing and operating C2 infrastructure, redirectors, domain fronting, and malleable communication profiles for covert operations.
- Hardware & embedded systems - Reverse engineering and security analysis of ATMs, PoS terminals, and IoT devices, including firmware extraction and UART/JTAG-based debugging.
- Homelab - Configuring and maintaining a personal lab environment with varied network setups, stacks, virtualization software, and hardened configurations.
My experience
Over 8 years of multi-domain offensive security experience across consulting and tech, as a senior tester, team lead, and primary client contact. Delivered assessments across government, finance, healthcare, energy, telecom, retail, and critical infrastructure.