OSCP+ certified engineer at Sydney Tools. I break things, then help teams build them back stronger.
Iโm an OSCP+ certified Application Security Engineer with 8+ years spanning full-stack development, penetration testing, and DevSecOps. I identify and exploit vulnerabilities in business-critical applications while leading secure development practices across engineering teams.
My journey from Senior Full-Stack Developer to Security Engineer gives me a rare perspective: I understand how developers think, which makes me effective at both finding vulnerabilities and providing practical remediation that actually ships.
I find vulnerabilities in web, APIs, cloud, and Active Directory โ and I write the exploit chain so developers see exactly how it happens.
I sit at the last review gate before production โ catching SQLi, XSS, IDOR and auth bugs before they ship, and writing remediation that actually lands.
5+ years shipping production systems. I know where developers cut corners because I cut them too โ it's why my remediation advice actually ships.
Security isn't about saying no. It's about finding ways to say yes, securely.
I don't just find vulnerabilities โ I understand the developer mindset and provide remediation that's realistic to ship. Having built production systems myself, I know what breaks, what gets deferred, and what actually makes it into the next sprint.