Ethical grey and black-box web application, internal and external infrastructure penetration tests, audits and exploitation. Have conducted numerous tests for government and blue chip companies. Operating system configuration reviews, including mainframes; Firewall and router security reviews; Intrusion analysis; Vulnerability assessments; Cloud service security testing; bespoke apps; Forensic analysis. Investigations using internet and device forensic techniques, including log and network packet analysis. Gathering evidence of intellectual property infringements, including original source and supply chain diversions, manufacturers and distributors. Online research and monitoring of illicit activity. Finding information using advanced non-invasive techniques, including data leakage of sensitive information. Expertise on threat intelligence and social engineering; writing and analysing security policies; report proofreading. Always deliver projects on time.