// Penetration testing, network defense & threat analysis. Building security from the ground up.
I'm a cybersecurity specialist focused on understanding how systems break — and how to make them resilient. My approach is hands-on: I learn by building, breaking, and rebuilding.
My work spans penetration testing, network security, reverse engineering, and Linux administration. I'm comfortable in terminal environments and prefer building custom tools over relying on off-the-shelf solutions.
Currently deepening my skills in offensive security, threat analysis, and security architecture — always looking for the next challenge.
Reverse-engineered a transit app's API endpoints using ADB, APK extraction, and JADX static analysis. Identified hidden Retrofit interfaces and base URLs.
Built a Python-based network reconnaissance tool for automated host discovery, port scanning, and service fingerprinting on local networks.
Designed a virtualized security lab with segmented networks, vulnerable VMs, and monitoring tools for hands-on penetration testing practice.
Focused coursework in network security, ethical hacking, digital forensics, and compliance frameworks. Active in CTF competitions and security research.
Built home lab environments, practiced on HackTheBox and TryHackMe platforms, reverse-engineered Android applications, and studied HIPAA security frameworks.
Developed core Linux administration skills, dual-boot setups, shell scripting, and networking fundamentals that form the base of all security work.
Open to internships, collaborations, security research projects, and CTF teams. If you have something interesting — reach out.