Threat Intelligence & Penetration Testing

Overview

I combine controlled testing techniques with structured threat analysis to understand how vulnerabilities are discovered, exploited, and mitigated. My vulnerability testing lab strengthened my ability to perform reconnaissance and evaluate internal security posture using Kali Linux and Ubuntu. I expanded this technical work through a MOVEit supply chain attack analysis, where I studied attacker behaviors, highlighted exploitation techniques, and assessed the effects. I continued to explore the growing problem of cybercrime and the jurisdictional, technological, and legislative challenges various groups face while attempting to protect victims through my cyberviolence white paper. Together, these artifacts demonstrate my combined capability in offensive testing, incident analysis, and informed threat intelligence interpretation.

Artifact 1 – Vulnerability Scanning Lab

Artifact 2 – MOVEit Cyber-Attack Deep Dive

Artifact 3 – Cyberviolence White Paper