Active Directory Attack Lab
Enumerated domain controllers via BloodHound, escalated privileges through Kerberoasting, and demonstrated Golden Ticket persistence. Documented full kill-chain with mitigations.
Security Researcher
Dedicated cybersecurity professional with hands-on expertise across penetration testing, vulnerability management, cloud security, and governance frameworks. Committed to the principle of ‘secure-by-default’ in every technical decision.
Security is not a feature; it is a foundation. Every technical decision, from architecture design to code implementation, is guided by the principle of ‘secure-by-default.’ This means proactively identifying and mitigating risks, maintaining defense-in-depth strategies, and ensuring that security is embedded at every layer rather than bolted on as an afterthought.
As the cybersecurity landscape evolves with emerging threats and technologies, continuous learning and hands-on experience are essential to staying effective.
Capabilities organized by security domain — from offensive operations to governance and tooling.
Penetration Testing & Exploitation
Detection, Response & Hardening
Governance, Risk & Regulatory
Infrastructure & Automation
Hands-on projects with documented methodology — from initial recon through exploitation and remediation.
Enumerated domain controllers via BloodHound, escalated privileges through Kerberoasting, and demonstrated Golden Ticket persistence. Documented full kill-chain with mitigations.
Built custom Sigma rules for detecting lateral movement and credential dumping. Tested against MITRE ATT&CK T1003 and T1021 techniques in an ELK Stack environment.
Performed OWASP Top 10 assessment against a custom DVWA instance. Identified SQLi, XSS, and IDOR vulnerabilities with proof-of-concept exploits and remediation guidance.
Configured isolated FlareVM environment with automated YARA rule scanning. Performed static and dynamic analysis on ransomware samples documenting IOCs and C2 communication patterns.
Designed and implemented VLAN-based segmentation with pfSense. Applied zero-trust policies and validated isolation through cross-segment penetration testing.
Mapped organizational controls against NIST CSF and CIS Benchmarks. Produced risk-scored findings report with prioritized remediation roadmap for stakeholders.
Certifications earned, in progress, and on the horizon.
Full CompTIA security track — from networking fundamentals through offensive testing and threat analysis.
Certified across the Rapid7 Insight platform — vulnerability management, endpoint detection, and application security.
Azure cloud, security/compliance, and AI fundamentals — demonstrating breadth across the Microsoft ecosystem.
Industry-recognized cloud and IT baseline certifications covering infrastructure, networking, and security principles.
Linux system administration — managing users, storage, networking, and security on RHEL environments.
2026Hands-on penetration testing certification with a 24-hour practical exam. The gold standard for offensive security.
2026Committed to contributing meaningfully to cybersecurity teams where technical expertise and a security-first mindset drive organizational resilience. Open to opportunities in penetration testing, vulnerability management, threat analysis, and security research.
-----BEGIN PGP PUBLIC KEY BLOCK----- mQINBGXXXXXBEACzxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx =XXXX -----END PGP PUBLIC KEY BLOCK-----
Use this key to send me encrypted messages. Fingerprint verification available on request.