Principal Security Professional | Ethical Hacker | CVE Contributor
With 20+ years of experience in information security, I specialize in penetration testing, red teaming, AI security, and threat modeling. As a recognized CVE contributor and OWASP collaborator, I am dedicated to advancing secure development practices and elevating organizational security standards.
A globally recognized certification for information security professionals that demonstrates expertise across multiple security domains, including governance, risk management, and the CIA triad (Confidentiality, Integrity, Availability).
A hands-on certification focused on advanced web application penetration testing, requiring the ability to identify and exploit vulnerabilities in custom web applications.
Specializes in assessing web application vulnerabilities and security, covering topics like SQL injection, cross-site scripting (XSS), and authentication flaws.
Demonstrates expertise in using Python for cybersecurity tasks, including automation, exploit development, and security tool creation.
Validates skills in identifying, exploiting, and mitigating vulnerabilities in systems, focusing on ethical hacking techniques and methodologies.
Recognizes proficiency in Microsoft technologies and solutions, showcasing expertise in implementing and managing Microsoft-based systems.
A foundational certification for IT professionals, covering hardware, software, troubleshooting, and basic networking concepts.
A vulnerability where attackers exploit improper handling of redirects, allowing unauthorized actions after a redirect.
Sensitive data passed in URLs can be exposed via logs, browser history, or referrer headers, leading to potential data leaks.
An attack where the action URL of a form is manipulated, redirecting submitted data to an attacker-controlled endpoint.