Available for hire.Let's build something secure.
I bring offensive security depth to teams that need more than compliance checkboxes — red teaming, detection engineering, adversary emulation, and security tooling built for real environments.
Roles I'm targeting
Red Team Operator
Adversary simulation, TTP development, C2 operations, and phishing campaigns that mirror real threat actors.
Detection Engineer
Detection-as-code, purple team playbooks, and SIEM/EDR rule development grounded in offensive experience.
Security Researcher
Vulnerability research, exploit development, binary analysis, and responsible disclosure.
Penetration Tester
Web app, network, and cloud pentesting with clear, actionable reporting stakeholders can act on.
Security Engineer
Building security tooling, automating workflows, and hardening infrastructure at scale.
Consultant
Short-term engagements for threat modeling, architecture reviews, and focused security assessments.
What I bring
- Real-world attack chain development — not just vulnerability scans
- Python, C++, and TypeScript tooling built to solve actual problems
- Purple team mindset: offensive findings directly inform detection coverage
- OSINT and dark web research capability for threat intelligence work
- Clear reporting that non-technical stakeholders can act on immediately
- Continuous practice on HackTheBox, TryHackMe, and security events
Engagement models
Security engineer, analyst, red team operator, or detection engineer roles.
Project-based or retainer for focused, time-boxed security work.
Short engagements: audits, threat modeling, assessments, and reviews.
