About me
I am a cybersecurity engineer who turns obstacles into opportunities. My days are spent weaving together penetration testing, red teaming, cloud security, and IAM design. For me, every log is a clue, every vulnerability a plot twist, and every solution a way to close the story with stronger, smarter defenses.
I see cybersecurity as a story, one I step into with every engagement, starting with reconnaissance, tracing the outlines of a system like the opening chapter of a mystery. Scanning follows, the plot thickening as hidden entry points reveal themselves. Then comes exploitation and post-exploitation, where theory meets action and each move rewrites the narrative. Finally, reporting closes the loop, turning raw findings into a roadmap for stronger defenses.
Somewhere between the lines, you'll usually find me with a cup of coffee in hand, chasing focus. And when the mission's accomplished, biryani is home, the comfort that reminds me why I do what I do.
What I'm Doing
-
Penetration Testing
Full-Cycle Assessments • Exploit Chains • Vulnerability Scoping • Actionable Reporting
-
Red Teaming
Adversary Emulation • Attack Simulation • Defense Evasion • Security Posture Validation
-
Cloud Security & IAM
Secure Architecture • IAM Policy Design • Cloud Hardening • Access Governance
-
Incident Response
Log Analysis • Threat Containment • Root Cause Analysis • Strategic Mitigation
Currently Hacking
HackTheBox
Pwning boxes & sharpening offensive skills
OSEP Prep
Advanced evasion techniques & C2 frameworks
Cloud Pentesting
AWS/Azure attack paths & misconfigurations
Malware Analysis
Reverse engineering & threat research