- Applied expertise in ethical hacking, operating systems, networking, social engineering, and vulnerability
assessment to strengthen digital security. - Conducted thorough penetration testing and vulnerability assessments for clients.
- Identified and mitigated multiple critical security risks.
- Conducted a digital forensics investigation, identified the cause and method of the attack, and the affected files.