Whoami?

I have a genuine, invested appreciation for penetration testing, vulnerability analysis, red team and cyber security.

My journey is fuelled by a commitment to delivering IT infrastructure and cyber security to businesses, charities and individuals.

Service Excellence

My array of services is tailored to meet your diverse needs. From personalized solutions to expert support, I’m committed to delivering excellence in every service offered.

Tailored Consultations

Benefit from personalised consultations that address your unique security requirements, providing strategic insights and solutions to unique problems.

24/7 Customer Support

Enjoy peace of mind with round-the-clock customer support, ensuring assistance whenever you need it, day or night.

Efficient Security Project Management

Experience streamlined project execution with our expert project management services, ensuring timelines and reports are met with precision and quality.

A Few of My Qualifications

I’ve worked to complete several major qualifications, covering IT Infrastructure, Security and Penetration Testing. Presently, I am working on OSCP and will continue to pursue a long list of qualifications on completion! These represent my top current certificates and will be updated regularly.

Crest CPSA

Crest CPSA is a globally recognised certification that validates essential skills and expertise required for effective penetration testing.

IBM Penetration Testing

Training on comprehensive network and web penetration testing services. penetration testing using tools, such as OWASP ZAP and SNYK.

THM Attacking AWS

With a large number of businesses adopting cloud technologies like AWS, this covers security implications of moving to the cloud.

CompTIA Security+

CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career.

Hundreds of Completed Virtual Environments

Over the past 2 years, I have completed environments across 3 platforms. The aim of this is to improve my problem solving, pentesting methodology and overall knowledge of the various platforms and frameworks present in Linux, Windows, Amazon and others.

HackTheBox

100+

Completed Environments
Pro hacker ranking

Offsec Proving Grounds

200+

Completed Environments
Ranked top 100

TryHackMe

50+

Completed Environments
100+ day streak

Check Out Decon.

Decon is a Github project I started mid-way through my OSCP studies and continue to work on while working as a full time pentester. The application operates somewhat like autorecon, having a version designed for CTFs prioritising a single target with minimal consideration for firewall evasion or traffic. The real-world version aims to scan multiple targets simultaneously with more consideration for CVSS scores and both major and minor vulnerabilities that are likely to be reported.

Professional OSINT Assessments

Identify exposed data, leaked credentials, and digital footprints before attackers do. Our OSINT assessments give you clear, actionable insight into your public risk surface.

Professional OSINT Assessments

Identify exposed data, leaked credentials, and digital footprints before attackers do. Our OSINT assessments give you clear, actionable insight into your public risk surface.

Discover Active Directory Testing

Explore hidden vulnerabilities in your AD infrastructure with expert testing and actionable insights.
Secure your network today with proven techniques tailored to enterprise environments.

Linux Infrastructure Assessments

Harden your Linux systems against privilege escalation, misconfigurations, and exploits.
Our penetration testing reveals what attackers can do once they’re in.

Web Penetration Testing

Expose and fix vulnerabilities before attackers exploit them — test your web apps today. Our assessments cover OWASP Top 10 and beyond, tailored to your environment..

Knowledge Bases

Throughout my studies and work I have taken extensive notes in an obsidian file. I routinely update these files and upload them here for others to use and learn from. These notes we built and used in multiple exams and probably every active engagement I have worked on.

Get in Touch.

Ready to take the next step? It would be great to talk further!

Explore The Blog

The Difference Between CTFs and AppSec

1. Real Applications Are Vastly More Complex CTFs typically involve hunting for vulnerabilities in custom-built applications designed specifically for[…]

A Guide to AWS S3 Bucket Penetration Testing

Introduction Misconfigurations in cloud environments and resulting data breaches frequently put AWS Simple Storage Service in the news. In[…]

A Complete Guide To ISO 27001 Penetration Testing

Introduction ISO 27001 compliance entails proving that an organization’s information security management system (ISMS) aligns with the standard’s requirements.[…]

Contact Me.

Got questions? We’re all ears! Reach out to us today to discuss your ideas, schedule a consultation, or simply say hello. We can’t wait to hear from you!