I am a security passionist with a proven track record in Defense-in-Depth architecture, incident response, and GRC (Governance, Risk, and Compliance). My experience centers on building highly resilient, layered defense systems—a methodology I even scale to my personal network, utilizing dual firewalls and secure DMZ principles.
My work focuses on understanding and mitigating risk, leveraging experience in both offensive and defensive security practices to build more robust systems.
Security Architecture: Layered Defense, Network Segmentation (VLANs/ACLs), Zero Trust Principles, and secure configuration management.
Offensive Security Research: Ethical Red-Teaming, Social Engineering Analysis, Physical Penetration Tactics (for defensive mitigation development).
Governance & Policy: Vulnerability Management, Incident Response Planning, and regulatory compliance adherence.
Infrastructure: Unraid OS, Docker, PowerShell (Currently expanding expertise), Linux Administration, and private LLM inference via custom hardware (i7-7700, dual NVIDIA GPUs).
The scripts found in my public repositories, such as those related to BadUSB payloads, are framed around Hardware Attack Surface Testing in a fun educational way.
These projects are designed for ethical analysis and educational purposes to understand how physical access vulnerabilities can be mitigated, not exploited. They demonstrate proficiency in:
Endpoint Security Policy Bypass: Developing proofs-of-concept to test the effectiveness of existing EDR and USB device controls.
Payload Development: Demonstrating competence in developing system-level commands using scripting languages for audit purposes.