👋 About Me

Hiii, I’m a security researcher and penetration tester with a blend of offensive and defensive experience, focused on penetration testing, network security, and cloud environments. I work extensively with Linux systems, Active Directory, and scripting to understand how real infrastructures operate and where they are most vulnerable.

I leverage frameworks like OWASP Top 10 and MITRE ATT&CK to strengthen security posture, while also practicing proactive defense through SIEM and threat hunting. Currently pursuing the OSCP certification, I enjoy challenges that bridge hands-on security research with real-world impact.


💻 The Craft I Spend Most Days On

I got into Infosec at a time when I needed focus and direction. I was looking for something demanding enough to fully engage my attention and channel my energy into growth. Cybersecurity became that outlet. Driven by curiosity, I began teaching myself through platforms like TryHackMe, YouTube, and community forums, learning the hard way through experimentation, failure, and persistence.

Over time, I built a strong foundation across core security domains threat modeling, vulnerabilities and exploits, cryptography, cloud and virtualization, operational security, and incident response. I reinforced this knowledge through hands-on labs and real-world simulations on platforms such as Hack The Box, HackMyVM, PortSwigger, and Vulnix, where theory quickly turned into muscle memory.

CTFs played a major role in shaping how I think. Competing in Boot2Root challenges led me to join a CTF team, sharpening my skills in enumeration, exploitation, privilege escalation, and post-exploitation. More importantly, they taught me how to approach problems creatively, stay methodical under pressure, and learn from failure.

Professionally, I’ve worked as both a web application penetration tester and a network penetration tester, gaining real-world experience across diverse environments. My work has involved assessing web applications, internal networks, Active Directory infrastructures, and Linux systems translating technical findings into clear, actionable insights for stakeholders. Along the way, I strengthened my collaboration and communication skills by working with teams across different cultures and time zones.

I’ve been fortunate to have some my penetration testing certifications sponsored, and even more fortunate to be part of a global security community filled with people I respect and learn from daily like (Ben heater, secfortress, ipsalmy, kurrupt, blackanon, venom, cocofelon, j4ndy, en route to better days, Jay, Ladeeee). I’m driven by continuous learning, ethical hacking, and the challenge of securing systems in real-world environments.

I’m always looking to grow, contribute, and take on problems that push me beyond my comfort zone.


🏅 Checklists and Certifications

This is a non-exhaustive list of certifications and courses I have taken.


Life Beyond Security

Outside of security, I’m currently pursuing a BSc in Computer Science, strengthening the fundamentals that support how I think and work in infosec. Music is my therapy, a way to slow down, reset, and find clarity when things get heavy. I’m also a football enthusiast, drawn to the discipline, strategy, and emotion that come with the game.

I enjoy writing my thoughts as a form of reflection and grounding. It helps me organize ideas, process experiences, and stay intentional, both personally and professionally. These spaces beyond the work are an essential part of how I stay focused, balanced, and curious.


✨ Future plans

Looking ahead, my goal is to grow into a red team–focused security researcher, with a strong emphasis on understanding systems at a deeper level rather than relying solely on tools. I want to continue studying attacker tradecraft, modern detection techniques, and how real-world adversaries operate across complex environments.

I plan to invest more time in security research, including exploit development, Active Directory abuse paths, and post-exploitation techniques, while staying closely aligned with defensive perspectives to better understand detection and response. Long term, I aim to contribute original research, share knowledge with the community, and take on work that pushes beyond checklists into realistic adversary simulation.


“What lies behind us and what lies before us are tiny matters compared to what lies within us.”
Ralph Waldo Emerson