About

Summary
Aspiring Cybersecurity professional with a strong focus on penetration testing supported by a growing portfolio of real-world lab simulations and red/blue team exercises.
Certified by industry-recognized organizations including CompTIA, Hack The Box, TCM Security, and INE, demonstrating a commitment to continuous growth and technical excellence.
Skilled at identifying vulnerabilities across enterprise networks. Capable of communicating findings through clear, actionable reports that support both technical teams and business decision-makers.
Hands-on experience in simulating attacks, analyzing threats, building custom labs, and documenting engagements with professional standards.
Driven passion for security research, eager to embrace challenges and contribute to security operations with precision and integrity.
Certifications
- CompTIA Security+
- Certified Red Team Operator (CRTO)
- Certified Red Team Lead (CRTL)
- TryHackMe Junior Penetration Tester (PT1)
- Certified Active Directory Pentesting Expert (HTB CAPE)
- HTB Certified Penetration Testing Specialist (CPTS)
- AWS Certified Cloud Practitioner (CCP)
- TCM Practical Junior Penetration Tester (PJPT)
- INE eJPTv2 (Junior Penetration Tester)
Education
SNHU
- Bachelor of Science in Cybersecurity
- Expected Graduation: 2027
Security Tools & Skillset
Network Security
- Performed vulnerability scans and traffic analysis using Nmap, Suricata, Wireshark, and the ELK Stack.
- Designed IDS/IPS simulations and monitored threat behavior in custom lab environments.
Active Directory Security
- Simulated attacks and privilege escalations in enterprise-like environments during HTB Pro Labs.
- Practiced enumeration, lateral movement, and domain persistence techniques.
- Configured and hardened personal labs to understand both offensive and defensive techniques.
Defensive Operations
- Investigated simulated incidents with Splunk, Security Onion, Sigma, and YARA.
- Developed detection rules and IR playbooks for common attack techniques.
Programming & Scripting
- Comfortable writing automation scripts and tools in Python, PowerShell, Bash, and C++.
Projects/Accomplishments
- Designed and implemented a custom Command and Control (C3) framework to simulate adversary behavior in red team and offensive security engagements.
- Developed the backend server using a Python Flask REST API, enabling functionalities such as agent registration, task management, command dispatching, and result collection.
- Built a Python-based operator client for seamless interaction with the C3 server, supporting tasking, operational control, and logging.
- C++ agent (implant) to establish persistent communication with the C3 server, execute remote commands, and result reporting.
- Built a hybrid offensive/defensive lab using Kali Linux, Security Onion, Kibana, and VirtualBox.
- Captured adversarial activity and conducted detailed analysis of attack vectors and network anomalies.
- Created a cloud-based honeypot in AWS EC2, attracting real-world attacks.
- Logged and visualized data to gain insight into threat actor behavior and improve detection capabilities.
Offensive Security Tool Development
- Created custom payloads and using C++, simulating adversarial behavior.
- Studied Windows API calls, process injection, and anti-analysis techniques.
- Focused on detection evasion and OPSEC considerations, reinforcing red team methodologies in a controlled lab environment.
HTB Defensive Security Analyst (CDSA) Path
- Completed a defensive security path focused on log analysis, threat detection, and response techniques.
- Leveraged SIEM tools and custom rulesets to detect anomalies and document findings.
HTB Pro Labs: Dante, Zephyr, Offshore
- Engaged with realistic enterprise network environments for red team training.
- Executed full penetration testing cycles, from enumeration to privilege escalation and reporting.

