What I Do
I break things for a living — systems, applications, infrastructure, whatever runs code. Security engineer by trade, offensive operator by mindset. I spend my time finding the cracks before someone else does, and building the defenses that actually hold.
My work spans red teaming, application security, cloud infrastructure hardening, and the kind of deep technical analysis that makes developers uncomfortable and security teams better.
Experience
Security Engineer Current
Working across offensive and defensive security — red team operations, vulnerability research, and building security tooling that scales. Focus areas include cloud security, application security, and supply chain risk.
Certifications
- Offensive Security Certified Professional (OSCP)
- CompTIA Security+
- CompTIA PenTest+
- eLearnSecurity Certified Professional Penetration Tester (eCPPT)
Focus Areas
- Red Teaming & Offensive Operations — Adversary simulation, breach simulation, and testing defenses under realistic conditions
- Application Security — Code review, threat modeling, and secure architecture design
- Cloud Security — AWS, GCP, and Azure security hardening, IAM policy review, and infrastructure-as-code auditing
- Supply Chain Security — Dependency analysis, build system integrity, and software composition analysis
- Vulnerability Research — Deep dives into how things break, responsible disclosure, and building exploit chains
Contact
This page is a living document. Updated as things change.