Default Avatar
Candidate Name
Red Team Engineer / Senior Offensive Security Engineer
Sri Lanka
Summary

I don't just find vulnerabilities; I help organizations understand how a real world adversary would exploit them.

With a focus on offensive security, my work centers on identifying systemic weaknesses across networks, web applications, and cloud infrastructure before the "bad guys" do. I specialize in ethical hacking, exploit development, and post-exploitation tactics, translating complex technical risks into actionable remediation strategies.

Core Competencies:

– Network Penetration Testing (Internal/External)
– Web Application Security & API Testing
– Red Team Operations & Adversary Simulation
– Vulnerability Research & Exploit Development
– Social Engineering
– Application Security
– GRC (ISO 27001,NIST,GDPR)

I’m driven by the "what if" scenarios. If there is a way in, I’ll find it and then I’ll show you how to close the door.

Work experience
01/10/2024
10/03/2026
Red Team Engineer
01/03/2024
01/10/2024
Cyber Security Engineer
01/04/2023
01/03/2024
Associate Cyber Security Engineer
Education & certifications
01/01/2020
01/01/2024
Bsc Hons.
Cybersecurity
Qualification verified
Open to relocate
Skills
Cybersecurity Information Security Network Security Penetration Testing Ethical Hacking Vulnerability Assessment Incident Response Risk Management Compliance Governance Firewalls Endpoint Security Cryptography Cloud Security Application Security Malware Analysis Security Operations Center (SOC) Digital Forensics Security Awareness Training Endpoint Detection and Response (EDR) Threat Modeling NIST Cybersecurity Framework ISO 27001 GDPR OWASP Top 10 Metasploit Burp Suite Python Scripting DevSecOps AI in Cybersecurity Mobile Security Wireless Security CEH Security Assessments Red Team Exercises Security Consulting Security Training Delivery Security Monitoring Security Risk Assessment Security Architecture Design Security Testing Vulnerability Management Security Awareness Cyber Threat Intelligence CrowdStrike Falcon Bash EDR CIS Controls Open-Source Intelligence (OSINT) CI/CD Security Infrastructure as Code (IaC) Security PowerShell Windows Event Log Analysis Active Directory Security Cyber Kill Chain Analysis Cloud Threat Intelligence Flutter Kubernetes AWS Azure Google Cloud Platform SEO GCP Linux

You need to log in as an employer to view full candidate details.