About Me
Who am I?
Hi! I’m a curious individual who’s been exploring Offensive Security for past 5 years. I’ve worked professionally as a Penetration tester and Offensive security Consultant for 3 years where I’ve taken apart numerous pieces of software and environments in search of security vulnerabilities with devastating impact. I hold the OSCP from offsec and you can find a more professional summary about me in my Professional Resumé
Why this Blog?
I created this primarily to mind dump experiences i’ve had on various pentesting & offensive security engagements. I’ll cover my technical workflow, road blocks I hit at various points, how I overcame said road blocks, exciting milestones I reached and more. Hopefully I can look back at these when I feel burned out or down - to remind myself that I. Am. Awesome!
And, who knows? Maybe someone else can learn a thing or two from what I write here ¯\_(ツ)_/¯
What I’m currently working on
Professionally
I’m currently working with brilliant minds at Migranium to deliver an AI-powered solution to meet healthcare challenges in Canada. To summarize, I’m in charge of ensuring Migranium is not breached! I do this by:
- reviewing and testing security policies to ensure they work
- reviewing and investigating alerts I recieve from the SIEM
- pentesting new features before they are released to production
- reviewing attack surface through automated means - I leverage Project Discovery tools for this
- and more.
Personally
On a personal level, I’m working on upping my Defensive Security game. My goal is to work as a Cybersecurity Engineer. I’m currently learning DevSecOps at York University, Canada. In my free time, I try to read articles and books that cover proper software devlopment principles.