I built an offensive security program from zero for a major insurance enterprise and I still spend 70-80% of my time testing. Web apps, APIs, mobile, cloud, IoT. I run purple team exercises with SOC teams and translate what I find into TTPs that blue teams can use. Currently looking to do this full-time for one company instead of twenty.
I run offensive security engagements for enterprise clients, mostly in fintech and insurance. Penetration testing across web applications, APIs, mobile apps, cloud environments (AWS, Azure, GCP), and IoT/OT systems. I also do secure design reviews, security code reviews, and threat modeling.
The part I care about most is making the defensive side better. I lead purple team exercises with SOC and blue teams, simulate real attack scenarios, and work with security operations to tune SIEM and EDR rules based on what actually works. I map findings to TTPs and write detection recommendations so the things I find can be caught next time.
I've reported over 110 validated vulnerabilities to companies like PayPal, Sony, AT&T, and Airbnb through HackerOne. The focus is always on critical attack paths: access control, authentication, API flaws, business logic in financial workflows.
I've built an offensive security program from scratch: methodology, tooling pipeline, reporting standards, hiring plan. I think about how the work scales before I start testing. A good program runs without me watching it.
I spend 70-80% of my time doing actual testing. Custom Nuclei templates, manual testing in Burp Suite, security code reviews in parallel. I write Python and Go tooling to automate what can be automated and spend my time on the things that need a human.
Pentest findings should make the SOC better. I run purple team exercises, validate detection coverage, and translate attack paths into TTPs and threat-hunting recommendations. If the defensive team can't catch what I did, the engagement isn't done.
Testing: Web apps, APIs, mobile (iOS/Android), internal networks, cloud (AWS, Azure, GCP), thick-client, IoT/OT
Languages: Python, Go, Bash, PowerShell, Java, .NET/C#
Tools: Burp Suite Pro, Metasploit, Cobalt Strike, Nmap, Wireshark, Bloodhound, Nuclei, Frida, Ghidra
Infra: Docker, Kubernetes, Terraform, Linux, Windows, CI/CD
Frameworks: OWASP Top 10, SANS Top 25, MITRE ATT&CK, NIST 800-53, PCI-DSS, PTES
If you're building an offensive security team and want someone who stays hands-on, I'd like to hear about it.