Red Team Operator // Incident Responder // Security Researcher

Red Team Operator & Security Researcher
Breaking into things by day and wondering why the SOC hasn’t called yet by night. Somewhere between DFIR and Red Teaming, fluent in “how did they get in?” and “watch me get in.” Mostly focused on Active Directory and Windows internals, plus the fun part of red teaming where C2 traffic, tradecraft, and tooling actually have to survive reality. It’s not a vulnerability. It’s an undocumented feature. 🔓
Adversary Emulation, Custom Tooling, OPSEC
Offense & Defense, Attack Path Analysis, Hardening
IR, Forensics, Detection Engineering, SOC Operations
Reversing, Auth Protocols, COM/DCOM, Credential Subsystems