The Cyber Sergeant: Showcasing Expertise in Cybersecurity and Leadership

Retired Green Beret turned Cybersecurity Engineer and Bug Bounty Hunter

My Projects

Showcasing my skills in cybersecurity and leadership through projects.

A dimly lit desk setup featuring a computer monitor displaying a document titled 'General Hardening Guideline'. The desk has a mechanical keyboard with blue and red keys, a lamp providing light on the right side, and various small items including notes pinned to the wall, a notebook, and a cup. There is a mesh office chair in front of the desk.
A dimly lit desk setup featuring a computer monitor displaying a document titled 'General Hardening Guideline'. The desk has a mechanical keyboard with blue and red keys, a lamp providing light on the right side, and various small items including notes pinned to the wall, a notebook, and a cup. There is a mesh office chair in front of the desk.
CTF Challenges

Engaging in Capture The Flag competitions to enhance skills.

A computer screen displays a portion of source code written in a programming language. The code includes comments and conditional statements, with particular emphasis on credential management.
A computer screen displays a portion of source code written in a programming language. The code includes comments and conditional statements, with particular emphasis on credential management.
Bug Bounty

Participating in bug bounty programs to identify vulnerabilities.

A chaotic chalkboard filled with various symbols, numbers, and text related to hacking. Words like 'HACKER', 'ATTACK', and 'UPLOAD' are prominently visible amidst a jumble of codes and cryptic symbols. The board conveys an atmosphere of mystery and complexity, reminiscent of a hacker's workspace.
A chaotic chalkboard filled with various symbols, numbers, and text related to hacking. Words like 'HACKER', 'ATTACK', and 'UPLOAD' are prominently visible amidst a jumble of codes and cryptic symbols. The board conveys an atmosphere of mystery and complexity, reminiscent of a hacker's workspace.
A padlock sits on a laptop keyboard with glowing red, green, and blue light trails swirling around, creating a sense of security and cyber awareness.
A padlock sits on a laptop keyboard with glowing red, green, and blue light trails swirling around, creating a sense of security and cyber awareness.
Leadership Training

Developing leadership programs based on military experience and expertise.

Cybersecurity Projects

Implementing cybersecurity solutions to protect digital assets effectively.

Work Experience

With 20 years of leadership experience in the U.S. Army Special Forces, I transitioned from a Green Beret to a Cyber Security Engineer and Bug Bounty Hunter.

Experience

Leadership in Cybersecurity

Retired Green Beret with extensive skills in cybersecurity and bug bounty hunting.

Signage on a wall reads 'Cybercrime Analysis & Research Alliance @ NTU (CARA)' in bold, white letters against a dark, textured surface. A corridor with partial ceiling panels is visible, and there's some greenery in the background.
Signage on a wall reads 'Cybercrime Analysis & Research Alliance @ NTU (CARA)' in bold, white letters against a dark, textured surface. A corridor with partial ceiling panels is visible, and there's some greenery in the background.
Cybersecurity Expertise

Experience. With our intuitive design and user-friendly interface, your website will captivate visitors. 2

Showcasing Expertise in Cyber Security

I am a retired Green Beret with 20 years of leadership experience, now excelling as a cybersecurity engineer and bug bounty hunter, showcasing my skills through this portfolio.

Two people appear focused and engaged while working on laptops at a wooden table. Both are wearing badge lanyards and seem to be collaborating. The table includes bottled beverages, a notebook, and a name plate that reads 'Team Outliers'. Stickers on one laptop suggest topics related to programming or software development.
Two people appear focused and engaged while working on laptops at a wooden table. Both are wearing badge lanyards and seem to be collaborating. The table includes bottled beverages, a notebook, and a name plate that reads 'Team Outliers'. Stickers on one laptop suggest topics related to programming or software development.
Exceptional skills in cybersecurity and leadership.

John Doe

"

Exceptional skills and leadership, truly a testament to dedication in cybersecurity and bug bounty hunting.

John Doe

A person is standing by a large window in a modern office with a cityscape view. They are wearing a dark hoodie and looking attentively outside, holding a smartphone. A desk with a computer monitor displaying colorful code is situated in the foreground.
A person is standing by a large window in a modern office with a cityscape view. They are wearing a dark hoodie and looking attentively outside, holding a smartphone. A desk with a computer monitor displaying colorful code is situated in the foreground.
A modern desk setup featuring a camera lens, a tablet displaying an interface with app icons, a pair of earbuds in an open charging case, and a book titled 'Wireless and Mobile Device Security' on a shelf below.
A modern desk setup featuring a camera lens, a tablet displaying an interface with app icons, a pair of earbuds in an open charging case, and a book titled 'Wireless and Mobile Device Security' on a shelf below.

★★★★★