Completed:
Performed manual and automated penetration tests on internal and external web apps
Tested REST and GraphQL APIs for authentication flaws, input validation, and logic bugs
Conducted internal network penetration testing, focusing on VLAN segmentation and VPN assessment
Reviewed source code in Python, JavaScript, and Java for critical vulnerabilities
Analyzed endpoint activity using CrowdStrike Falcon EDR to support detection and response
Led phishing simulations and delivered awareness sessions for engineering teams
Collaborated with DevOps on CI/CD security integrations and patch validation
Created detailed security reports with mapped OWASP Top 10 and MITRE techniques
Performed full-scope internal and external pentests across applications, infrastructure, and legacy systems
Conducted privilege escalation, lateral movement, and post-exploitation analysis during red team ops
Supported blue teams by contributing attacker emulation scenarios and detection tuning
Helped build SIEM rules and custom alerting using observed attacker behavior
Wrote technical documentation and remediation plans tailored for both engineers and leadership
Maintained internal scripts and recon tools to support faster vulnerability identification
Security engineer with 4+ years of hands-on experience in web application, API, and network penetration testing. Skilled at identifying and exploiting real-world vulnerabilities across enterprise environments, and translating them into actionable insights. Experienced with CrowdStrike Falcon and secure CI/CD practices.