About Me

My background is in offensive security operations - red team engagements, penetration testing, and intelligence work. The focus has always been on finding vulnerabilities before adversaries do.

I've conducted security assessments across government infrastructure, financial systems, and large-scale web platforms. Each engagement follows the same methodology: reconnaissance, enumeration, exploitation, and documentation. The work requires custom tooling - automation that finds weaknesses faster than manual testing alone.

Physical security assessments add another dimension. Badge cloning, access control bypass, wireless exploitation, and social engineering tests reveal gaps that network scans miss. The reality is that technical controls only matter if physical security is solid.

Intelligence training shapes how I approach assessments. It's about thinking like an adversary - understanding resources, objectives, and attack vectors. That perspective helps identify risks that traditional security audits overlook.

Intelligence tradecraft applied to finding vulnerabilities before adversaries do.

Start a Conversation