I am a cybersecurity professional with strong experience leading red teaming and intelligence-led engagements across enterprise environments. As a Project Lead, I have planned and delivered advanced attack simulations that include Active Directory exploitation, mobile intelligence-led testing, and full-scope offensive operations. My technical expertise spans mobile application security on both Android and iOS, web and API penetration testing, host assessments, and comprehensive internal and external vulnerability assessments.
Well-versed in tools such as Impacket, BloodHound, Certipy, Frida, Objection, Burp Suite, and VMware ESXi labs, I combine deep technical execution with leadership and client-facing communication. I am experienced in translating complex technical findings into clear, actionable reporting for executives and technical teams alike, ensuring remediation efforts are prioritized and effective. Passionate about offensive security, I continuously build and refine lab environments to replicate adversary tradecraft and strengthen organizational resilience against real-world threats.
As a Project Lead for red teaming assessments, I manage and deliver end-to-end offensive security engagements, including Active Directory exploitation, intelligence-led red team operations, and mobile intelligence-led scenarios. My role involves planning, executing, and reporting complex attack simulations that mirror real-world adversaries, ensuring that clients receive both technical depth and actionable insights.
I am highly skilled in mobile application security testing for both Android and iOS, with experience in reverse engineering, static and dynamic analysis, and bypassing security controls such as root/jailbreak detection and SSL pinning. Beyond mobile, I am also well-versed in traditional penetration testing, including web application testing, API security assessments, and vulnerability assessments covering both internal and external infrastructure.
My expertise extends to host assessments and Active Directory exploitation, where I routinely identify privilege escalation paths, lateral movement opportunities, and configuration weaknesses. Combining technical execution with leadership, I ensure that every engagement results in clear findings, remediation guidance, and executive-level reporting that supports long-term security improvements for clients.
FIRST CVSS v4.0 Certificate
OPSWAT Introduction to Critical Infrastructure Protection
OPSWAT OT Security Expert
PICUS Web Application Attack Module
PICUS Sales Engineering Teams Exam