Ethical Hacker & Security Specialist

Protecting digital assets through expertise in cybersecurity and ethical hacking

About Me

My expertise and approach as an ethical hacker

Who I Am

I am a dedicated cybersecurity professional specializing in ethical hacking and security analysis. With extensive experience in network security, penetration testing, and vulnerability assessment, I help organizations strengthen their security posture against potential threats.

My approach combines technical expertise with a deep understanding of attacker methodologies to provide comprehensive security solutions.

My Approach

  • Thorough vulnerability assessment and penetration testing
  • Proactive security hardening and risk mitigation
  • Secure coding practices and application security
  • Network security architecture and implementation
  • Security awareness training and team development

Technical Skills

My expertise in cybersecurity and ethical hacking

Operating Systems

  • Windows Server/Desktop
  • Linux (Ubuntu, Linux Mint)
  • Kali Linux
  • Debian
  • Tails
  • Parrot OS
  • BlackArch

Programming Languages

  • C#
  • PHP
  • Python
  • JavaScript/Node.js
  • HTML/CSS
  • SQL
  • Bash Scripting

Most Used Security Tools

  • Nmap
  • Sqlmap
  • Wireshark
  • Burp Suite Pro
  • Metasploit Framework
  • Nessus
  • Ghidra
  • IDA
  • Binary Ninja
  • Aircrack-ng
  • John the Ripper
  • Hydra
  • Nikto
  • OWASP ZAP
  • BeEF
  • Maltego

Intelligence & Analysis

  • OSINT Techniques
  • Maltego
  • Shodan
  • Ettercap
  • Hashcat
  • TheHarvester
  • Recon-ng
  • SpiderFoot
  • Sherlock Project
  • Social Engineering Tools
  • Network Traffic Analysis

Frameworks & Technologies

  • Bootstrap
  • .NET Framework
  • Ajax
  • MongoDB
  • MySQL
  • Docker
  • Git

Soft Skills

  • Team Management
  • Project Leadership
  • Communication Skills
  • Problem Solving
  • Work Ethic
  • Time Management
  • Critical Thinking
  • Adaptability
  • Documentation
  • Training & Mentoring

Work Experience

My professional journey in cybersecurity

Pentester

Reengineering S.R.L

Aug 2024 - May 2025

I work as a Security Analyzer at Reengineering S.R.L, focusing on web application and software security. I conduct red team penetration testing and security assessments to improve the company's software security posture.

Security Testing Red Team Penetration Testing

Volunteer

Trace Labs

May 2024 - Jun 2024

I joined Trace Labs, a volunteer project connecting professionals globally. We utilize artificial intelligence and OSINT (Open Source Intelligence) to locate missing people.

OSINT Intelligence Analysis Profiling

Manager

Horagon Network

Jul 2023 - Oct 2023

Initially worked as a Security Manager and later as a Manager at Horagon Network startup. Responsibilities included server management, security, staff management, hiring, and active development of company software. The company had 19,000 subscribers.

Security Management Server Administration Team Leadership Software Development

Security Analyzer

AzureMC Network

Apr 2022 - Jul 2023

Worked as a Security Manager managing internal and external network security, with a focus on server and web application security. Handled personnel management, hiring processes, and conducted staff training within the network.

Network Security Web Application Security Personnel Management Training

Competitions

Showcasing my competitions in cybersecurity

Security Training

BuckeyeCTF 2025

BuckeyeCTF 2025 is a 48-hour online Jeopardy CTF, organized by Buckeye Bureau of BOF. And we managed to place 128 out of 716 teams.

Team RootRunners Cybersecurity Jeopardy
Security Training

m0leCon CTF 2026 Teaser

m0leCon CTF 2026 Teaser is a 24-hour online Jeopardy CTF, organized by pwnthem0le. And we managed to place 94 out of 638 teams.

Team RootRunners Cybersecurity Jeopardy
Security Training

Hack.lu CTF 2025

Hack.lu CTF 2026 is a 48-hour online Jeopardy CTF, organized by FluxFingers, the CTF team of Ruhr-University Bochum (Germany). And we managed to place 132 out of 299 teams.

Team RootRunners Cybersecurity Jeopardy
Security Training

K17 CTF

K17 CTF is a 48-hour online Jeopardy CTF with a mix of beginner-friendly and hard challenges, hosted by UNSW's Security Society. And we managed to place 144 out of 972 teams.

Team RootRunners Cybersecurity Jeopardy
Security Training

07CTF

07CTF is a 36-hour Capture The Flag competition organized by team 0bscuri7y. The event features challenges across a variety of categories, including web, crypto, forensics, OSINT, misc, and reverse engineering. And we managed to place 29 out of 200 teams.

Team RootRunners Cybersecurity Jeopardy
Security Training

Olicyber 2025 Finals

I qualified for the national finals of OliCyber 2025 — an exclusive stage reserved for the top competitors from each region — after placing in the top 50 out of 466 in the territorial round. This achievement reflects strong technical proficiency in cybersecurity, a competitive mindset, and effective problem-solving under time pressure.

Individual CTF Cybersecurity Problem Solving
Security Training

Olicyber 2025 territorial selection

Achieved placement in the top 50 out of 466 participants in the territorial phase of OliCyber 2025, demonstrating strong skills in cybersecurity challenges and problem-solving.

Individual CTF Cybersecurity Problem Solving
Olicyber Cybercamp

Olicyber 2025 Cybercamp

Participated in advanced cybersecurity training camps, gaining hands-on experience with advanced attack techniques. Achieved 4th place in the internal unofficial competition.

Individual CTF Training Advanced Attacks
CTF Competition

Olicyber 2023 competition

Achieved 2nd place in the regional phase of OliCyber 2023, the Italian national cybersecurity competition for high school students

Individual CTF

Certifications & Badges

Professional qualifications and achievements

Check skills

CISCO Ethical Hacker

October 2024

Cisco verifies the earner of this badge successfully completed the Ethical Hacker course. The holder of this student level credential has a broad understanding of the legal and compliance requirements and is proficient in the art of scoping, executing, reporting vulnerability assessments, and recommending mitigation strategies. The holder has completed up to 34 hands-on activities using Kali Linux, WebSploit, and other tools.

CISCO Python Essentials 1

October 2024

Cisco, in collaboration with OpenEDG Python Institute, verifies the earner of this badge successfully completed the Python Essentials 1 course and achieved the student level credentials. Earners have knowledge of the concepts of computer programming, the syntax and semantics of the Python language as well as demonstrate the ability to accomplish coding tasks related to the essentials of programming in the Python language and resolve implementation challenges using the Python Standard Library.

CISCO Networking Basics

January 2025

Cisco verifies the earner of this badge successfully completed the Networking Basics course and achieved this student level credential. Earner has knowledge of the types of networks, how they work, how devices send and receive data, the types of network cabling, how IP addresses find information on the Internet, how transport and applications operate, and has practiced building a home wireless network. Participated in up to 13 Cisco Packet Tracer activities.

Networking Academy Learn-A-Thon 2023

October 2023

This badge is awarded to students and instructors who participated in a Learn-A-Thon event organized by a local Networking Academy.

CISCO Introduction to Cybersecurity

October 2023

Cisco verifies the earner of this badge successfully completed the Introduction to Cybersecurity course. The holder of this student-level credential has introductory knowledge of cybersecurity, including the global implications of cyber threats on industries, and why cybersecurity is a growing profession. They understand vulnerabilities and threat detection and defense. They also have insight into opportunities available with pursuing cybersecurity certifications.

Contact Me

Get in touch for security consultations

Let's Connect

I'm available for security consultations, penetration testing, and security training. Feel free to reach out to discuss how I can help secure your digital assets.

mail.forward.staff@gmail.com