Information security professional with experience in various domains of IT Security Consulting Risk Management: Malware Intel Collection -Breaking everything I touch (and fix it). -Perform threat and vulnerability research to identify new ways of achieving the program’s mission and act as a source for innovation within the cyber security program. -Control over target systems using social engineering, client-side and server-side exploits, local privilege escalation, and password attacks leveraging common offensive tool kits. -Review and Analyze security vulnerabilities to identify false positives. -Lead vulnerability assessments, source code reviews, penetration tests, Red Team and phishing exercises, security architecture configuration reviews, and technical security compliance reviews. -Simulate real-time cyber-attacks using Red Team. -Developing in house tools / scripts to improve delivery and facilitate testing operations. -Develop Red Team exercise scenarios and objectives that are relevant to business stake holders. Develop and maintain Red Team infrastructure and tooling.