Cybersecurity professional operating at the intersection of offensive security and operational project leadership.
Background spans penetration testing, security-aligned program management, and hands-on infrastructure engineering. Security work is approached with defined scope, deliberate execution, and findings that translate into action rather than noise.
The differentiator is the integration of adversarial thinking with structured delivery. Offensive security doesn't exist in isolation. It intersects with engineering timelines, stakeholder priorities, and organizational risk. That intersection is managed: clear objectives established, risk tracked through remediation, accountability maintained from kickoff through verified resolution.
Biohazard Industries is the operating entity behind this work, built to deliver focused security capability with the discipline and communication that technical and non-technical stakeholders both require.
Core Competencies
Offensive Security
Adversarial testing, vulnerability discovery, exploit validation, and actionable remediation guidance across web applications, APIs, and network infrastructure.
Project Leadership
Security-aligned planning, Agile/Kanban execution, milestone governance, stakeholder communication, and disciplined delivery oversight.
Infrastructure Engineering
Purpose-built lab environments, secure system configuration, remote assessment infrastructure, and operational tooling.
Operational Systems & Tooling
CRM configuration and deployment, workflow automation, engagement tracking systems, and operational infrastructure built for repeatable, scalable security delivery.
Technical Documentation
Structured reporting for offensive security engagements, process standardization, playbook development, and findings documentation with executive and technical clarity.
Stakeholder Communication & Management
Cross-functional coordination across technical and non-technical stakeholders, client relationship management, expectation setting, and clear communication throughout engagement lifecycles.
Selected Projects
CRM Configuration and Implementation
Enterprise CRM deployment and operational integration
Configured and deployed Zoho CRM for company-wide use, including user roles, pipelines, workflow automation, and standardized reporting dashboards. Integrated CRM with existing operational processes to centralize client relationships, engagement tracking, and project data.
Impact: Enabled scalable client relationship management, improved data visibility, and supported operational efficiency across teams.
Secure Remote Assessment Infrastructure
Secure dropbox design, deployment, and lifecycle management
Configured and managed Raspberry Pi 5 devices as hardened assessment dropboxes for deployment into client environments. Deployed Tailscale for encrypted remote access and Tailnet administration. Standardized the full device lifecycle: build, secure transport, client deployment, and retrieval. Documented repeatable processes for consistency across engagements.
Impact: Delivered a scalable, operationally sound solution that streamlined internal penetration testing operations and reduced deployment friction.
Engagement Tracking System
Offensive security project management infrastructure
Designed and maintained Microsoft Planner boards to manage offensive security engagements end-to-end, from planning through reporting. Standardized workflows and task structures for technical testers and management, enabling Agile/Kanban execution with clear progress tracking. Built reporting dashboards for leadership visibility into engagement status, dependencies, and resource allocation.
Impact: Streamlined engagement tracking, improved team coordination, and delivered consistent transparency for clients and leadership throughout active engagements.
Active Directory Homelab
Controlled enterprise environment simulation for adversarial research
Engineered a Windows Server 2019 homelab using VMware virtualization, simulating a full enterprise AD environment. Configured domain structure, Organizational Units, Group Policy Objects, user and group hierarchies, and permission tiers. Used as a controlled target environment for practicing privilege escalation, lateral movement, and domain compromise techniques.
Impact: Deepened Active Directory exploitation knowledge and established a repeatable internal research environment for offensive security skill development.
Operating Philosophy
The name Biohazard Industries reflects the nature of cybersecurity work: potentially dangerous threats handled with structured precision.
Security work requires calm execution under pressure. It requires technical depth paired with operational discipline. It requires treating risk seriously without creating noise.
The objective is not visibility.
The objective is control.