whoami
OSEPin progress
CRTL2026
RastaLabs2025
CRTO2025
Dante2024
PenTest+2024
CPTIA2024
PTIA2024
GICSP2023
Offensive Security Specialist focused on Red Teaming across Active Directory, Entra ID, and hybrid environments, covering the full attack lifecycle from reconnaissance to post-exploitation and defense evasion in critical infrastructure scenarios.
Experienced in planning and executing engagements aligned with the TIBER-EU framework for the European financial sector, as well as TIBER-Like adaptations for other industries, managing complex C2 infrastructure with a strong emphasis on Operations Security.
Skilled in Adversary Emulation in collaboration with Blue Teams through Purple Teaming exercises, aimed at evaluating the effectiveness of security controls, detection capabilities, and incident response procedures.
Responsible for engagement reporting, including the identification, prioritization, and evaluation of remediation actions.
Strong background in:
- Malware Development - design and implementation of custom tooling and payloads for initial access, persistence, and lateral movement, with a focus on bypassing modern endpoint defenses (EDR/AV) through evasion techniques
- Penetration Testing - targeting web applications, web services, and IT infrastructures for major clients in the public, banking, and financial sectors
- Threat Intelligence, Threat Modeling, and attack surface analysis - leveraging open sources and proprietary platforms to contextualize targets, map the attack perimeter, and define realistic threat scenarios to emulate