Details
Skills
• Red-team & offensive security — hands-on C2, OPSEC, persistence, lateral movement, adversary emulation.
• Malware & exploit development — custom payloads, binary analysis, fuzzing, simulated zero-day tooling.
• EDR/XDR evasion & tradecraft — obfuscation, custom loaders/stagers, LOLBAS and living-off-the-land techniques.
• Python programming & automation — scripting, agents, tooling, SMTP/email automation and attack/defense tooling.
• Full-stack web development — React frontends, Node.js backends, PostgreSQL and MongoDB integration.
• DevOps / CI-CD & containers — Docker, GitHub Actions/GitLab CI/Jenkins, multi-stage builds, IaC (Terraform).
• MCP server & AI-agent engineering — design and deployment for agent communication and orchestration.
• Email infrastructure & deliverability — PowerMTA experience, VMTA pools, DNS and deliverability troubleshooting.
• Cloud & container security — AWS/Azure/GCP, Kubernetes hardening, cloud identity and runtime protection.
• Data engineering & ML tooling — data pipelines, Pandas/Polars, MLflow, model integration and deployment.
About
I am a highly accomplished professional holding a B.Sc. in Computer Science. With over 8 years of expertise and excels as both a Cybersecurity Engineer and a Web Developer. Renowned for simulating advanced threat actor techniques using custom-built tools and real-world exploitation chains to identify critical vulnerabilities before adversaries do uncover and reported over 130 high-impact security flaws across 40+ enterprise environments, resulting in a 78% reduction in exploitable attack surface
I currently lead a small-sized team called Ciphernest — feel free to check us out at www.ciphernest.ca