Offensive Security Engineer • Penetration Tester • Red Team Aspirant
Offensive-minded cybersecurity professional with 3+ years of enterprise security experience, actively pivoting into penetration testing and red team operations. Uniquely positioned with deep defensive knowledge — having secured 750+ government endpoints and collaborated directly with CERT-In — combined with growing offensive skills via OSCP preparation and TryHackMe Jr Penetration Tester path. Brings rare combination of government-scale infrastructure insight and offensive security mindset sought by elite red teams.
| Skill Area | Tools & Techniques |
|---|---|
| Web Application Testing | OWASP Top 10Burp Suite SQLiXSS Command InjectionIDOR |
| Network Pentesting | NmapMetasploit NetcatWireshark Traffic Analysis |
| Privilege Escalation | Linux PrivEscWindows PrivEsc Service ExploitsMisconfigurations |
| Vulnerability Research | CVE AnalysisIDS Signature Dev Exploit Research |
| Scripting & Automation | PowerShellBash PythonGitHub Copilot Claude AI |
| Log Analysis & Forensics | Windows Event ViewerSentinelOne EDR WAZUH SIEMKACE UEM |
| Firewall & Network Ops | Check PointSophos NGFW WiJungle NGFW |
| Training Platforms | TryHackMeHackTheBox VulnHub |
| Platform | Path / Activity | Status |
|---|---|---|
| TryHackMe | Jr Penetration Tester Learning Path | ⬛ In Progress |
| HackTheBox | Starting Point Machines | ✅ Active |
| OSCP (PEN-200) | Offensive Security Certified Professional | 🎯 Target 2026 |
| CompTIA Sec+ | SY0-701 Exam Preparation | 🎯 Target 2026 |