JOSHUA S
h3xh7wk
M.Tech (CSE) student specializing in red teaming and offensive security, delivering clear, reproducible findings from web and network penetration tests across Linux and Windows environments. Experienced in end-to-end attack simulation—from reconnaissance to safe proof-of-concept validation—supported by disciplined documentation that translates technical risk into prioritized, actionable remediation. Comfortable with tunneling, pivoting, and packet analysis to validate real-world impact in segmented networks. Regular CTF participation and hands-on lab work sharpen technique and adaptability under pressure. Build small Python and Bash automations, along with Dockerized labs, to ensure repeatable testing, controlled experimentation, and reliable results. Strong focus on methodology-driven testing, avoiding tool-only assessments in favor of hypothesis-based exploration and verification. Familiar with crafting realistic adversary scenarios to evaluate detection gaps, logging quality, and response readiness. Value clean reporting, minimal assumptions, and evidence-backed conclusions that security and engineering teams can act on quickly. Continuously refining skills through self-hosted labs, open-source tooling, and practical experimentation, with an emphasis on learning how systems fail—not just how exploits succeed.
Certified Associate Penetration Tester
Hands-on certification validating core pentest methodology, tools, and techniques across reconnaissance, exploitation, post-exploitation, and reporting.
Certified Red Team Analyst (CRTA)
Hands-on certification validating end-to-end adversary emulation across Windows/Active Directory: initial access, privilege escalation, lateral movement.
Multi-Cloud Red Team Analyst
Hands-on credential focused on offensive operations across cloud environments, covering cloud reconnaissance, identity abuse, privilege escalation in hybrid scenarios.
Active Directory Red Team Specialist
Hands-on certification focused on Active Directory attack paths, including privilege escalation, lateral movement, and operational reporting.
Cyber Security Professional
Passed the W3Schools Cyber Security certification exam and awarded the Cyber Security Professional credential (professional level). Certificate of completion issued July 6, 2025.
Cyberthon Winner
Secured 1st place at SRM Institute’s 24-hour cybersecurity hackathon. Built a project to identify the IP address behind a dark web (.onion) site, focused on darknet investigations and red team tradecraft.
CTF Quest Top Three
Secured a top-three finish in the CTF Quest at THIRAN 2025, representing Sri Ramakrishna Engineering College and solving real-world cybersecurity challenges with peers.
SREC Hackathon 2.0 2nd Place
Secured 2nd place at SREC Domestic Hackathon 2.0 with team SyncSphere for an OD & event management system.
R00T@W4R CTF 2025
3rd Place
Secured 3rd place at R00T@W4R CTF 2025, organized by the Dept. of CSE (Cybersecurity), PSNA College of Engineering & Technology, Dindigul. Awarded Certificate of Winner — Star Performer on Aug 2, 2025.
Cybercom CTF 2025
3rd Place
Secured 3rd place with Team Knull in Cybercom CTF 2025 (Chennai, Sept 27–28). Awarded a Certificate of Appreciation; verification code CYB-6L2Z-V9P4.
Flag Hunter 2.0
4th Place
Placed 4th overall after finals in Flag Hunter 2.0, with strong clears in forensics and web plus steady progress in OSINT, crypto, and speed rounds.
Advent of Cyber 2025
Completed TryHackMe’s Advent of Cyber 2025, covering SOC operations, web exploitation, and digital forensics over 24 days of hands-on challenges.
Israel–India Hackathon 2026
1st Place
Won 1st place at the Israel–India Global Innovators Hackathon 2026 at Sri Ramakrishna Engineering College. Built “The Traffic Simulator,” a synthetic SIEM/XDR log generator with anomaly injection.