About
Highly accomplished and results-oriented Cybersecurity Specialist with over four years of extensive experience in penetration testing, red teaming, and vulnerability management. Proven ability to identify, exploit, and remediate critical security vulnerabilities, significantly enhancing system resilience and reducing breach risks. Adept at utilizing a wide array of industry-standard tools and methodologies, including Burp Suite, Metasploit, and Cobalt Strike. Recognized for achieving a 95% success rate in vulnerability identification and contributing to substantial improvements in system security. Seeking to leverage advanced technical expertise and strategic insights to protect complex digital infrastructures.
Work
→
Summary
Actively engaged in vulnerability assessment and penetration testing to enhance client system security.
Highlights
Proactively identified and remediated critical security vulnerabilities in client systems using advanced tools (Burp Suite, OWASP ZAP, Metasploit), resulting in a 20% reduction in security breaches.
Employed advanced penetration testing techniques, including fuzz testing and reverse engineering, to conduct comprehensive system security evaluations.
Continuously researched and integrated cutting-edge attack techniques and methodologies, leveraging tools like SQLmap, Nikto, and DirBuster.
Authored comprehensive vulnerability reports, providing actionable remediation steps to enhance system integrity.
→
Summary
Contributed to red team operations, focusing on identifying and exploiting vulnerabilities in client environments.
Highlights
Led penetration testing engagements, identifying and exploiting critical vulnerabilities in client systems with a 95% success rate using advanced red team tools (Cobalt Strike, Metasploit, John the Ripper).
Analyzed complex security findings and delivered actionable recommendations that improved system resilience by 40%.
Fostered team collaboration to continuously refine penetration testing methodologies and stay abreast of emerging security trends.
Proficiently utilized a diverse suite of tools including Burp Suite, Nessus, OWASP ZAP, and Nikto for robust web application security assessments.
→
Summary
Engaged in continuous self-driven learning and practical application of penetration testing techniques.
Highlights
Achieved 'Hacker' rank on the Hack The Box platform, demonstrating advanced practical cybersecurity skills.
Successfully navigated and solved complex security challenges across various domains, including penetration testing, malware analysis, cryptography, and network security.
Gained extensive hands-on experience with industry-standard security tools such as Metasploit, Burp Suite, Nmap, Wireshark, and John the Ripper.
Drove continuous learning and skill development through independent research and experimentation with emerging cybersecurity techniques.
Languages
English
Fluent
Indonesian
Native
Certificates
Skills
Programming Languages
C/CPP, Python, Go.
Platforms
Unix, Linux, Android, Raspberry Pi.
Development
Web Development, Mobile Development, API Development.
Penetration Testing Tools
Metasploit, Burp Suite, Nmap, Nessus, OpenVAS, Aircrack-ng, John the Ripper.
Web Security Tools
OWASP ZAP, Nikto, SQLmap, Acunetix.
Network Security Tools
Wireshark, Tcpdump, Ettercap, Snort.
Reverse Engineering Tools
IDA Pro, Ghidra, Radare2.
Cybersecurity Concepts
Network Security, Penetration Testing, Vulnerability Assessment, Exploit Development.