Subject Profile / Background and Approach
Subject, in profile.
A cybersecurity professional working both sides of the line: offensive research and defensive intelligence, with a bias for shipping repeatable systems rather than one-off reports.
Started in 2020 with a single bug bounty submission on OpenBugBounty. Five years and 2,500+ disclosures later, that obsession with finding what shouldn't be there has become a career: OSCP, CVE-2023-37737, and Hall-of-Fame credits from Sony, Nintendo, Autodesk, and Michelin.
Today: Cyber Threat Analyst at LAB 1 Limited, London. The day-to-day is Python automation for threat-intelligence collection, ransomware-group tracking, and dark-web investigation work that feeds directly into internal intel reports.
The longer arc I'm building: a research practice that combines automation, intelligence, and offensive testing into a single operational loop, less theatre, more measurable output.
A three-layer assembly. Offensive at the top is where the work starts, recon, exploit development, manual pentesting. Defensive in the middle, detection engineering, log analysis, SIEM operations. Intelligence at the foundation, OSINT, dark-web monitoring, threat-actor tracking.
Each layer informs the others. Offensive context shapes defensive priorities. Defensive telemetry refines offensive recon. Intelligence is the substrate that makes both meaningful.
University of Roehampton
Coursework: Cyber Security, Machine Learning, AI, Algorithms, Data Science, Data Engineering, Data Visualisation, Operating Systems, Software Development.
International Excellence Scholarship
Up to £4,000 per year for high-achieving international students.
Programme Representative
One of three CS reps. Faculty ↔ student liaison across the programme.