I specialize in Web Exploitation, Governance, Risk Management, and Compliance, Reverse Engineering, Forensics, and Network Traffic Analysis.
My repositories showcase real-world solutions, research, and hands-on challenges in cybersecurity, feel free to explore!
- 📚 Selected Works: Check out any of my repos for a sample of my approach.
- 🏆 Interests: Catch The Flag challenges.
- 🌐 Links:
Whether it’s dissecting packets or diving into a pool, I thrive on curiosity, focus, and pushing boundaries.
Information Security professional with hands-on experience in security assessments, vulnerability management, and risk analysis. Strong focus on implementing ISO/IEC 27001 concepts including ISMS design, risk assessment, control selection, and compliance-driven security practices.
Currently working as an Information Security Officer at Austrange Solutions, where I conduct OWASP Top 10-based assessments and develop an ISO 27001-aligned ISMS framework.
| Certification | Issuer |
|---|---|
| ISO/IEC 27001 Lead Auditor | Mastermind |
| Ethical Hacker | Cisco |
| Jr. Penetration Tester | TryHackMe |
| VAPT | Alison |
ISO/IEC 27001 ISMS Design Risk Assessment Control Selection Compliance Auditing Security Policy Development Remediation Planning
OWASP Top 10 OWASP WSTG Web Application Security Vulnerability Assessment Penetration Testing API Testing Packet Analysis
Burp Suite Nessus Metasploit Nmap Caido ZAProxy Python Bash Linux
Information Security Officer - Austrange Solutions (Nov 2025 - Present)
- Conducting OWASP Top 10-based web security assessments to identify application vulnerabilities
- Developing an ISO/IEC 27001-aligned ISMS framework to support compliance readiness
- Assisting with risk analysis and remediation recommendations for security findings
- Built a custom Python vulnerability scanner to automate web security checks
Information Security Consultant - Quasar CyberTech (Mar 2025 - Jun 2025)
- Conducted manual web application security assessments aligned with OWASP WSTG
- Developed custom CLI tools for Clickjacking detection, Google Dorking, and HTTP header misconfiguration scanning
- Used custom scripts and tailored Nessus profiles to improve testing depth and accuracy
2x National-Level CTF Participant - Top 25 Finisher
Open to GRC roles, security consulting, and InfoSec collaboration. Reach out via LinkedIn, Email, or my website.





