Red team operator and penetration tester specializing in network exploitation, web application security, and social engineering. Turning attack surfaces into hardened defenses.
I'm an offensive security professional with 6+ years of experience breaking into systems so organizations can better defend them. My work spans network and web application penetration testing, social engineering, red team engagements, and vulnerability research.
At the Tennessee Valley Authority, I've led comprehensive offensive security engagements for critical infrastructure, established a government Vulnerability Disclosure Program, and advanced our social engineering and breach simulation capabilities. I also bring hands-on experience in OSINT and SIGINT collection.
I'm driven by a passion for understanding adversary tradecraft and translating offensive findings into real defensive improvements. I hold a TS/SCI clearance and continuously pursue advanced certifications and research to stay ahead of evolving threats.
Interested in working together on offensive security, red team operations, or threat intelligence? I'm always open to discussing new opportunities and challenges.