Run red team operations and purple team exercises for enterprise clients in financial services. Active Directory, Entra ID, EDR evasion, C2 infrastructure, social engineering. Lead engagements end to end and make sure findings actually strengthen the organization, not just prove a point.





Red team operations and purple team exercises for enterprise clients, mostly in financial services. The work is scenario driven: scope an objective, build the attack path, execute against production with real EDR deployed, and report what worked and what the defenders missed.
Most of my engagements involve Active Directory and Entra ID environments. Lateral movement, privilege escalation, trust abuse, the full chain to domain compromise. When the SOC catches me, the engagement shifts to purple team and we work together to close the gap.
On HackerOne, 120+ validated vulnerabilities on companies like PayPal, Sony, AT&T, and Airbnb. That research keeps the tradecraft sharp outside of scoped engagements.
OSINT, threat intel, target profiling. Understand who would actually attack this organization, how they would do it, and what they would go after. The attack plan follows from that.
Evade the EDR, build the C2, move laterally, escalate. Use real attacker TTPs in production. If the engagement does not feel real, the findings will not either.
The point is better controls, not a gotcha. When detected, pivot to purple team. When reporting, explain what the SOC should look for next time. Make the org stronger.
Red Team: Cobalt Strike, Sliver, Nighthawk C2, Bloodhound, custom C2 tooling
Testing: Burp Suite Pro, Nuclei, Metasploit, Nmap, Wireshark
Languages: Python, Go, Bash, PowerShell, C, C++, Rust
Platforms: Windows AD, Entra ID, Windows OS, macOS, Linux, AWS, Azure
Frameworks: MITRE ATT&CK, OWASP Top 10, NIST, PTES, CVSS
Red team operator who leads engagements end to end and makes organizations stronger.