Protecting Digital Assets | Penetration Testing | Security Consulting
Open to new opportunities and collaborations
Dedicated to securing the digital world, one system at a time
Passionate cybersecurity professional specializing in offensive security and penetration testing. With hands-on experience in identifying and exploiting vulnerabilities, I help organizations strengthen their security posture through comprehensive assessments and actionable recommendations.
I am dedicated to continuous learning and knowledge sharing through detailed walkthroughs, security research, and community engagement. My approach combines technical expertise with clear communication, making complex security concepts accessible to both technical and non-technical stakeholders.
Currently pursuing advanced certifications and actively participating in CTF challenges to stay at the forefront of emerging security threats and exploitation techniques.
Security Assessments
Vulnerabilities Found
Certifications
Comprehensive security assessments to identify vulnerabilities before attackers do. Detailed reports with actionable remediation steps.
Design and implementation of secure network architectures. Firewall configuration, IDS/IPS deployment, and network segmentation.
Regular scanning and assessment of systems to identify and prioritize security weaknesses across your infrastructure.
Strategic security guidance, policy development, and compliance advisory for various frameworks including ISO 27001, NIST, and PCI DSS.
Rapid response to security incidents. Investigation, containment, and recovery services to minimize impact and prevent future attacks.
Customized security awareness training for teams. Workshops on secure coding, social engineering, and best practices.
A structured learning path covering AI security, red teaming, and privacy research
This portfolio mirrors the structure of my AI Red Teaming repository, which I use as a complete learning and research workspace.
01-Fundamentals-of-AI 02-Applications-of-AI-in-InfoSec 03-Introduction-to-Red-Teaming-AI 04-Prompt-Injection-Attacks 05-LLM-Output-Attacks 06-AI-Data-Attacks 07-Attacking-AI-Applications-and-Systems 08-AI-Evasion-Foundations 09-AI-Evasion-First-Order-Attacks 10-AI-Evasion-Sparsity-Attacks 11-AI-Privacy 12-AI-Defense
25 topics · Complete
Module 0226 topics · Complete
Module 033/12 topics · In Progress
Module 04Structure created
Module 05Structure created
Module 06Structure created
Module 07Structure created
Module 08Structure created
Module 09Structure created
Module 10Structure created
Module 115/22 topics · In Progress
Module 12Structure created
Open to job opportunities, freelance projects, and professional collaborations
I'm actively seeking new opportunities in cybersecurity. Whether you're a recruiter, hiring manager, or potential collaborator, I'd love to hear from you. Let's discuss how I can contribute to your organization's security posture.