8 Years of Enterprise Red Team Operations
Founder & Lead Red Teamer
ThreatMatrix Academy, Gurugram — Active
Offensive Security Specialist | Red Team Operator | Cybersecurity Trainer
CVE discoveries, end-to-end Active Directory compromise, and a training academy built from production attack chains — documented for due-diligence review.
8+ Years
Multiple CVEs
100+ Trained
5 Pro Labs
Offensive security operations in production enterprise environments.
Publicly disclosed vulnerabilities in enterprise software — independently researched and verified.
Practitioners trained across Red Teaming, AD Pentesting, and Ethical Hacking.
HTB CPTS, Dante, RastaLabs, CEH, and multiple CTF completions on record.
Roles, Operations & Outcomes
Founder & Lead Red Teamer
Security Researcher & Red Team Operator
ThreatMatrix Academy — Gurugram, India | 2021 – Present
Independent & Enterprise Engagements | 2016 – Present
Discovered and disclosed multiple CVEs across enterprise software — vulnerability research conducted against live targets, not sandboxed replicas.
Built and operates a full-cycle practical cybersecurity academy delivering Red Teaming and AD Pentesting programs from live attack playbooks.
Executed end-to-end red team operations: Active Directory compromise, lateral movement across segmented networks, privilege escalation, and credential dumping at scale.
Trained 100+ practitioners using curriculum derived directly from enterprise breach simulations — no borrowed syllabus, no theoretical filler.
Delivered breach simulations for enterprise clients — scoped engagements with full kill-chain documentation and executive debrief.


Certifications & Lab Completions
HTB Certified Penetration Testing Specialist (CPTS)
HackTheBox Dante — Red Team Operator Level I
HackTheBox RastaLabs — Red Team Operator Level II
CEH — Certified Ethical Hacker (EC-Council)
Multiple CTF wins and Pro Lab completions across HackTheBox and national-level competitions.
CVE-backed. Enterprise-proven. Available for hire.
Offensive security in production since 2016.
Red team engagements, penetration testing contracts, and corporate training inquiries — routed directly to the operator.
