Experience with vulnerability scanning, exploitation techniques, and CTF challenges. Proficient in identifying web vulnerabilities like XXE, SQL Injection, and utilizing web shells.
Architecting secure CI/CD pipelines, automating deployments, and securing containerized environments.
Building and configuring local and cloud-based logging infrastructure for threat detection and incident response.