Senior Security Consultant at 4+ years of offensive security experience across Web & API security testing, Red Team operations, Mobile application security, Cloud environments, and Active Directory exploitation.
OSCP+ · eWPTX · CRTP certified, with experience assessing enterprise environments in banking, fintech, healthcare, and government sectors. Skilled in identifying complex attack paths, chaining vulnerabilities, and simulating real-world adversarial techniques to evaluate and strengthen organizational security posture.
Open to offensive security roles globally.
🔒 "Breaking applications before the bad guys do — so you don't have to worry about them."
Leading penetration testing engagements across web, API, mobile, network, and cloud for enterprise banking, fintech, and government clients.
Led red team assessments and full-scope penetration testing across network, web, API, and mobile for diverse industry clients.
Comprehensive security assessments across networks, applications, and systems with detailed remediation reporting.
Real-world cyber attack simulation across client networks and web applications.
Manual black & grey box testing of web apps and REST/GraphQL APIs. Deep expertise in OWASP Top 10 — SQLi, XSS, SSRF, XXE, IDOR, auth bypass, OAuth misconfigs, and business logic flaws. Core stack: Burp Suite Pro, ZAP, ffuf, sqlmap.
Full red team operations — AD enumeration and exploitation via BloodHound, Mimikatz, Rubeus. Kerberoasting, Pass-the-Hash, DCSync, Golden/Silver tickets, lateral movement, and persistence. Phishing with Evilginx & Gophish.
Android & iOS penetration testing end-to-end. Static analysis with MobSF & Jadx, dynamic analysis with Frida & Objection, ADB manipulation, SSL pinning bypass, and Checkra1n for iOS jailbreaking.
AWS security assessments: IAM privilege escalation, S3 bucket misconfigs, IaaS/SaaS/PaaS attack paths. Network recon with Nmap & Naabu, Wireshark packet analysis. Docker, Kubernetes, and CI/CD pipeline security with SonarQube.
Adversary simulation using Evilginx2 for credential harvesting with MFA bypass, Gophish phishing campaigns, pretexting and vishing scenarios. Full social engineering kill-chain for red team engagements targeting enterprise environments.
Attack surface discovery via Subfinder, Amass, ffuf, Shodan and Censys. Python & Bash scripting for automation and custom tooling. OS environments: Kali Linux, macOS, Windows. Strong technical and executive report writing.
Issued by: Offensive Security
Date: December 12, 2025
OSID: 57166646
View CertificateIssued by: Offensive Security
Date: December 12, 2025
View CertificateIssued by: eLearnSecurity
Date: February 23, 2022
ID: 3205833
View CertificateIssued by: Altered Security
Date: September 20, 2024
ID: ADLID7452
View CertificateIssued by: Amazon Web Services (AWS)
Status: Pursuing
Issued by: The Japan Foundation
Date: July 7, 2019
ID: N5A238977A
View CertificateFull OSCP methodology, privesc checklists, exploitation techniques and tooling built through PEN-200 lab work.
Active Directory attack paths, Kerberoasting, BloodHound enumeration, lateral movement, and persistence techniques.
Concise HTB machine solutions covering Linux & Windows — SSRF, SQLi, LFI, command injection, privesc chains and more.
Detailed walkthroughs of HTB machines with full enumeration, exploitation paths, and privilege escalation breakdowns.
Vulnerability patterns, payload collections, and methodology notes from real-world engagements and PortSwigger labs.