Certified Ethical Hacker & Penetration Tester

(Security Audits)

I provide specialized **Ethical Hacking** and **Defensive Security** services designed to identify systemic weaknesses before adversaries exploit them. By simulating sophisticated cyber-attacks across Web, Cloud (AWS/Azure), and Internal Infrastructure, I help organizations transition from reactive patching to proactive resilience. My engagements leverage a "Purple Team" mindset—exploiting vulnerabilities while simultaneously validating the effectiveness of Blue Team detection and response capabilities.
Scope Web/API, Network, Cloud, Mobile
Standards OWASP Top 10, NIST, PCI DSS
Focus Vulnerability Assessment & Remediation Guidance
Certification CEH, OSCP, or equivalent
Abstract graphic representing a digital audit or penetration test
Description de l'image RRR.

Demonstration of successful exploitation and evidence collection during a network penetration test.

(Pentest Process)

Phase 1: Threat Modeling & Vulnerability Assessment. I adopt a risk-centric approach, starting with deep Threat Modeling to understand critical assets and potential attack vectors. Utilizing industry standards like **OWASP Top 10**, **CWE**, and **NIST 800-115**, I conduct rigorous manual assessments logic flaws and authentication bypasses that automated scanners miss. This phase ensures comprehensive coverage of the attack surface, from exposed APIs to misconfigured IAM roles in the Cloud.
Phase 2: Exploitation & Strategic Remediation. I move beyond theoretical risk by executing safe, controlled exploitation to demonstrate real-world impact (e.g., PII exfiltration, admin takeover). The engagement outcome is not just a report, but a roadmap for security maturity. I provide detailed Proof-of-Concepts (PoCs) alongside developer-friendly remediation guides, assisting engineering teams in implementing secure coding practices and robust architectural defenses to permanently close security gaps.

(Validated Skills)

Year
Type
Certification / Achievement
Link / Validation
2023
Certification
Offensive Security Certified Professional (OSCP)
2024
Certification
AWS Certified Security - Specialty
2025
Competition (CTF)
Top 5 Finish in DEF CON Qualifiers (Team Name)
Description de l'image RRR.
Description de l'image RRR.
Description de l'image RRR.
Description de l'image RRR.
Description de l'image RRR.
Description de l'image RRR.
Description de l'image RRR.
Description de l'image RRR.
Description de l'image RRR.

(Tool Mastery)

Assessment Phase
Key Tools and Frameworks
Reconnaissance & Scanning
Nmap, Shodan, Masscan, Nessus, OpenVAS
Web App & API Testing
Burp Suite Pro, ZAP, SQLmap, Dirb/Gobuster
Exploitation & Post-Exploitation
Metasploit, PowerShell Empire, Mimikatz, BloodHound