About
New Era >>> Same Passion: From IT Foundations to Cyber Security Excellence
Two Decades of IT Expertise
With nearly 20 years of experience in the IT industry, I’ve built a comprehensive foundation that spans the full spectrum of technology infrastructure. For 10 of those years, I served as an IT Technical Consultant specializing in IT Infrastructure, Systems Engineering, and Cloud management. This extensive background provided the perfect springboard for my ultimate transition into Cyber Security in 2022—a move that felt both natural and necessary given the evolving threat landscape.
Throughout this journey, I’ve operated my own UK Limited company for the past decade, providing specialized consultancy services to IT firms and AI Consultancy firms requiring expertise for their diverse client portfolios. This entrepreneurial approach has allowed me to work across prestigious locations including the 1 square mile of the City of London, Canary Wharf, and Manchester’s bustling business centre. These experiences in financial districts and commercial hubs have given me invaluable insights into the security challenges faced by organizations at the highest levels.
Transitioning to Cyber Security with Purpose
In 2022, driven by the escalating demand for skilled professionals in the cyber security field, I made a deliberate pivot from my extensive IT background into this critical domain. My journey began with earning the prestigious Certified Ethical Hacker (CEH) credential—a milestone that marked my formal entry into the world of ethical hacking and cyber defense.
What started as a professional transition quickly evolved into a passion-fueled mission. I’ve since immersed myself in the practical applications of ethical hacking, climbing to the top 3% on TryHackMe’s competitive platform. This achievement reflects not just theoretical knowledge but hands-on expertise in identifying vulnerabilities and understanding attack methodologies from the perspective of those who seek to breach systems.
Deepening Expertise in Offensive Security
My CEH certification serves as the foundation of my cyber security practice, but I don’t stop there. I’m currently expanding my skill set with a focus on Open Source Intelligence (OSINT) techniques—gathering actionable intelligence from publicly available sources to identify potential security threats before they materialize.
The practical application of these skills comes through Red Team exercises, where I simulate real-world attack scenarios to test organizational defenses. These exercises allow me to think like an attacker while helping organizations strengthen their security posture. My aim is to deepen this impact through increased hands-on engagement with complex security challenges that reflect the evolving threat landscape.
Building Specialized Security Infrastructure
Beyond theoretical knowledge, I actively build and deploy comprehensive security tools and platforms. My expertise includes implementing robust solutions like Proxmox for virtualization, OpenCTI for threat intelligence management, SecurityOnion for network security monitoring, and Wazuh for unified XDR and SIEM capabilities. These hands-on implementations provide me with deep insights into both offensive and defensive security operations from the ground up.
I’m constantly exploring emerging tools that push the boundaries of automated security testing, including innovative projects like Shannon—a fully autonomous AI pentester that delivers actual exploits rather than just alerts. This commitment to staying at the forefront of security technology ensures my clients benefit from cutting-edge protection strategies.
Bridging IT Experience with Cyber Security Expertise
My nearly two decades in IT infrastructure—including On-Premises Data Centres, 3rd Line Engineering, and Cloud Engineering—provides a unique advantage in understanding the systems I now work to protect. Specializing in Microsoft technologies, VMWare, SAN Storage, and Linux gives me comprehensive insight into potential attack vectors and security weaknesses.
This background allows me to approach cyber security not just from an offensive perspective but with a defensive mindset that considers the entire technology stack. Whether analyzing the MITRE ATT&CK framework for threat intelligence or dissecting the Unified Kill Chain in advanced cyber attacks—as featured in my recent blog posts—I bring both technical depth and strategic thinking to every security challenge.
Harnessing AI for Cyber Security Innovation
Beyond traditional security methodologies, I’m pioneering the integration of Artificial Intelligence into offensive and defensive security operations. My expertise extends to building specialized knowledge bases using Open-WebUI, where I craft precise system prompts and task-focused prompts to develop proprietary cyber security datasets. This custom-trained approach allows me to enhance offensive security capabilities while simultaneously strengthening defensive measures.
My workflow incorporates “vibe coding” with AI tools through Ollama in VS Code, creating a seamless development environment for rapid prototyping and implementation of security solutions. I’ve also established sophisticated AI workflows using N8N to automate repetitive security tasks, while leveraging AI to build specialized agents that can simulate attack patterns, analyze threats, and recommend countermeasures.
Passion for Practical Security Education
My dedication to cyber security extends beyond professional practice—I’m genuinely passionate about platforms like TryHackMe and HackTheBox that provide hands-on learning experiences. These platforms have been instrumental in developing my practical skills, and I continue to engage with them regularly to stay sharp and explore new attack techniques. This commitment to continuous learning ensures I’m always prepared for the latest threats and attack methodologies.
The Future of Security: AI-Enhanced Protection
In today’s evolving threat landscape, AI is becoming indispensable in the fight to protect future customers and safeguard existing clients’ businesses. By combining my year of expertise with advanced AI capabilities, I’m developing next-generation Techology solutions that can anticipate, identify, and neutralize threats more effectively than traditional methods alone.
Whether you’re following my journey on social media or seeking specialized cyber security expertise, I invite you to connect with me. I’m always looking for new clients and contracts in the UK, Europe, and any location that offers exciting challenges and competitive compensation. Together, we can navigate the complex cyber security landscape and build more resilient digital environments powered by both human expertise and artificial intelligence.