Whoami?
I have a genuine, invested appreciation for penetration testing, vulnerability analysis, red team and cyber security.
My journey is fuelled by a commitment to delivering security, IT infrastructure and cyber security.
Hundreds of Completed Virtual Environments
Over the past 2 years, I have completed environments across 3 platforms. The aim of this is to improve my problem solving, pentesting methodology and overall knowledge of the various platforms and frameworks present in Linux, Windows, Amazon and others.
Offsec Proving Grounds
200+
Completed Environments
HackTheBox
100+
Completed Environments
TryHackMe
50+
Completed Environments
A Few of My Qualifications
I’ve worked to complete several major qualifications, covering IT Infrastructure, Security and Penetration Testing. Presently, I am working on OSCP and will continue to pursue a long list of qualifications on completion! These represent my top current certificates and will be updated regularly.

IBM Penetration Testing
Training on comprehensive network and web penetration testing services. penetration testing using tools, such as OWASP ZAP and SNYK.

CompTIA Security+
CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career.

THM Attacking AWS
With a large number of businesses adopting cloud technologies like AWS, this covers security implications of moving to the cloud.
Service Excellence
My array of services is tailored to meet your diverse needs. From personalized solutions to expert support, I’m committed to delivering excellence in every service offered.
Tailored Consultations
Benefit from personalised consultations that address your unique security requirements, providing strategic insights and solutions to unique problems.
24/7 Customer Support
Enjoy peace of mind with round-the-clock customer support, ensuring assistance whenever you need it, day or night.
Efficient Security & Development Project Management
Experience streamlined project execution with our expert project management services, ensuring timelines and reports are met with precision and quality.
Get in Touch.
Ready to take the next step? It would be great to talk further!
Explore Our Blog

The Difference Between CTFs and AppSec
1. Real Applications Are Vastly More Complex CTFs typically involve hunting for vulnerabilities in custom-built applications designed specifically for[…]

A Guide to AWS S3 Bucket Penetration Testing
Introduction Misconfigurations in cloud environments and resulting data breaches frequently put AWS Simple Storage Service in the news. In[…]

A Complete Guide To ISO 27001 Penetration Testing
Introduction ISO 27001 compliance entails proving that an organization’s information security management system (ISMS) aligns with the standard’s requirements.[…]
Contact Me.
Got questions? We’re all ears! Reach out to us today to discuss your ideas, schedule a consultation, or simply say hello. We can’t wait to hear from you!