Connect

Aspiring Cybersecurity Professional

As a passionate cybersecurity enthusiast based in Canberra, Australia, I am focused on offensive security and penetration testing. I dedicate countless hours to sharpening my red team skills, exploring new attack techniques, and mastering the latest tools used by ethical hackers.

My journey into cybersecurity is fueled by a relentless drive to understand, exploit, and secure systems. I hold CompTIA Network+ and Security+ certifications and am actively pursuing CCNA, Azure Fundamentals, PenTest+, and Certified Ethical Hacker (CEH). Through hands-on labs, capture-the-flag challenges, and real-world simulations, I continuously refine my ability to think like an attacker and defend against evolving threats.

I thrive on problem-solving and enjoy the challenge of uncovering vulnerabilities, whether through web application testing, network exploitation, or social engineering. My projects include home pentesting labs, exploit development, and security research, all aimed at building my expertise in ethical hacking.

With experience across logistics, education, and customer service, I bring strong communication, collaboration, and analytical skills that enhance my ability to assess security risks and provide effective solutions. My ultimate goal is to become a top-tier penetration tester, helping organizations strengthen their defenses through proactive security assessments.

I am committed to continuous learning, pushing my limits, and contributing to the cybersecurity community as I carve my path into the offensive security world.

Blue Team

Dive into the world of defensive security! Learn about SIEMs, threat detection, incident response, and the essential tools used to protect and defend networks.

Red Team

Uncover the arsenal behind ethical hacking! Explore the cutting-edge tools and techniques used for penetration testing, vulnerability exploitation, and staying ahead of threats.

Purple Team

Bridge the gap between offense and defense! Learn how Red and Blue Team tactics combine to strengthen security, detect threats, and proactively mitigate risks.