I help businesses identify and fix security weaknesses before attackers can exploit them — through real-world, ethical hacking engagements and practical, prioritized guidance.
Understand exactly what your external and internal network exposes and how an attacker might move through it.
Download the free 2025 Small Business Cybersecurity Checklist — a simple, one-page guide that lets you quickly evaluate your company’s real security posture.
Download Checklist (PDF)Deep OWASP-based assessments targeting logic flaws, injection, access control issues, and more.
Internal and external testing to identify weaknesses across servers, services, and network segments.
Safe, authorized phishing and awareness testing to measure human risk without causing harm.
Clear deliverables designed for both technical teams and business stakeholders.
Explore more: Penetration Testing Services · Book a Penetration Test · Pentest Portfolio
I don’t just read about security — I actively build and break things in controlled environments. I’ve completed full end-to-end pentest scenarios, including realistic attack paths, privilege escalation, and lateral movement, as well as defensive analysis scenarios where the focus is on understanding what happened and how to respond.
I’ve also worked through malware analysis scenarios, focusing on how malicious tooling behaves, how it installs persistence, and what artifacts it leaves behind for defenders to detect.
To push things further, I work on using AI and automation to support security teams:
These projects help defenders focus on the highest risks.
I back up my hands-on work with structured learning and certifications, including:
My motivation is simple: I like understanding how things break, and helping people fix them.
Every engagement includes all required documentation and legal approvals.