Transitioning from a career in close protection into cybersecurity, with a focus on penetration testing, Active Directory security, and attack detection.
My background in close protection gave me a foundation that directly transfers into security work — threat assessment, risk management, operating under pressure, and thinking like an adversary before they act.
I'm now applying that mindset to the technical side, building hands-on skills through a structured Active Directory lab environment covering the full attack lifecycle from initial access through to domain compromise and detection.
- Active Directory penetration testing and attack path analysis
- Privilege escalation, lateral movement, and credential attacks
- Attack detection and log analysis using Elastic SIEM
- BloodHound graph analysis and misconfiguration identification
- Kali Linux
- Nmap · Hydra · NetExec · Impacket · Mimikatz
- BloodHound · SharpHound
- Elastic Stack · Kibana · Winlogbeat
- Hashcat
👉 Cybersecurity Labs – Full AD Attack & Detection Lab
An 11-project lab series covering:
- Active Directory enumeration and exploitation
- Credential dumping and Pass-the-Hash attacks
- Lateral movement across domain systems
- SIEM-based detection and log analysis
- BloodHound attack path analysis (ADCS, DCSync, session hijacking)