I'm an Application Security Engineer with 4+ years of hands-on experience in offensive security — vulnerability assessment, penetration testing, and secure code review across Web, API, Mobile, Thick Client, and Network environments.
My work centers on simulating real-world attacks — from OWASP Top 10 exploitation and authentication abuse to full adversary-emulation exercises, plus AI / LLM security testing against the OWASP Top 10 for LLMs and the ASI01–ASI10 agentic framework. I translate findings into clear, prioritized remediation that engineering teams can ship without guesswork.
I published CVE-2025-54592 against FreshRSS and have been recognized by the security programs at Zoho, TECNO, OPPO, OnePlus, and private bug-bounty programs. Currently ranked #21 globally on TECNO SRC.
Beyond full-time consulting, I take on freelance security engagements for SaaS & startups. Flexible scoping, fixed-price or retainer.
Freelance Services
01Web Application PentestOWASP Top 10, auth & business-logic abuse
02Mobile Application PentestAndroid & iOS — MobSF, Frida, Jadx
03API Security TestingREST & GraphQL — BOLA, BFLA, mass assignment
04Secure Code Review (SCR)SAST-driven + manual review across stacks
When I'm not testing, I'm automating — Python-first — building recon pipelines, custom Burp extensions, and threat-intel workflows that stitch together tools like Shodan, Amass, and theHarvester.