Hi, How Can We Help You?

Alex – Cyber Professional Portfolio

ꓮꓲех ꓮցոісk | Cyber Operations Enthusiast | Penetration Tester


About Me

Hi, I’m ꓮꓲех ꓮցոісk, a dedicated Cyber Operations student at the University of Arizona with a passion for red teaming, penetration testing, and offensive cybersecurity strategies. With experience in both digital and physical security, I specialize in uncovering vulnerabilities and developing innovative solutions to protect critical systems. My ultimate goal is to apply my skills in a way that serves my country one day.


Education

Certifications

Exterro ACE Certified

https://drive.google.com/file/d/14wdDJ4rAr1z1AdVigsk5cHqI70c46_XH/view?usp=drive_link

Comptia SecurityPro Graduate

(No Certificate Given, Grade of A given for class in MCC transcript)

AWS Architect Graduate

https://drive.google.com/file/d/1eiGMdAC2bFBGORyoQMRXak4fPbs5zL_f/view?usp=sharing

FCC Technician License 

https://www.qrzcq.com/call/KK7OUF

 


Public Speaking Engagements


Skills & Expertise

Technical Skills

  1. Penetration Testing (Web, Network, and Application)
  2. Vulnerability Scanning and Exploitation
  3. Wireless Network Hacking (Wi-Fi Penetration Testing)
  4. Reverse Engineering Software and Firmware
  5. Limited Malware Analysis and Payload Development (Limited Experience with Programming Languages)
  6. Incident Response and Forensics Analysis
  7. Social Engineering Techniques (UofA has one of the best instructors in existence)
  8. DNS Poisoning and Spoofing
  9. Network Traffic Analysis with Wireshark
  10. Packet Injection and Manipulation
  11. Setting Up and Exploiting Reverse Shells
  12. Custom Exploit Development
  13. Advanced Use of Metasploit
  14. Bypassing Antivirus and Endpoint Detection Platforms (including covert sidechannel exfiltration of intelligence)
  15. Advanced Cryptographic Techniques
  16. OSINT (Open Source Intelligence) Investigations
  17. Steganography and Data Hiding Techniques

Hardware and Electronics

  1. Building Long-Range RFID and NFC Cloning Devices
  2. Performing PCILeech Evil Maid Attacks through a Direct Memory Access Attack via PCIE or Thunderbolt
  3. Basic Circumvention of BIOS Access Control Measures
  4. Familiar with Panasonic Toughbook FZ55 Hardware Disassembly, Modification and Reassembly
  5. Circumvention of Tamper Evident Seals, Devices and Packaging using specialized tools (IE Heat Gun, Tamper Tweezers, Etc.)
  6. Designing Custom Hardware for Exploits
  7. Signal Interception with RTL-SDR and HACKRF
  8. Night Vision Repair (I have fixed a Gen3 Monocular)
  9. Creating EMP Devices for Testing Shielding
  10. Developing Encrypted Radio Communication and Tracking Systems
  11. Customizing Rubber Ducky Payloads for Advanced Use Cases
  12. Designing Keyloggers and Hardware Implants
  13. Exploiting Several Physical Access Control Systems by using Master Key (IE DK16001) and shorting specific circuits
  14. Building and Programming Custom Red Team Platforms using Raspberry Pi
  15. Wiegand Protocol Interception and Exploitation

Physical Security

  1. Non-Destructive Entry (NDE) Techniques
  2. Covert Lockpicking and Bypass Methods
  3. Forensic Locksmithing
  4. Bypassing Electronic Locks and Keypads using UV, Thermal and Wiegand Bypasses
  5. Differential Power Analysis Attacks for Electronic Safes
  6. Improvised Entry Tools Fabrication and Disguising for Corporate Security Checkpoints
  7. Tensioning Techniques for Advanced Locks
  8. Covert Surveillance Equipment Deployment
  9. CMOE for Physical IT Infrastructure (Server Rooms, Cabinets)
  10. Securing Physical Access to Critical Infrastructure

Cyber Operations

  1. Crafting Advanced Phishing Campaigns
  2. Performing Red Team Assessments
  3. Cyber Threat Intelligence Gathering
  4. Exploiting IoT Devices and Embedded Systems
  5. Privilege Escalation on Linux and Windows Systems
  6. Creating Obfuscated PowerShell Scripts for Penetration Testing
  7. Cloud Security
  8. Exploiting Active Directory Misconfigurations
  9. Writing and Using Custom Python Scripts for Reconnaissance
  10. Side-Channel Attacks on Systems and Applications

Other Unique Skills

  1. Designing and Deploying Honeypots (limited – PFSense Platform)
  2. Building CTF Challenges and Labs
  3. Linux System Hardening
  4. Engineering Physical Test Environments for Training
  5. Setting Up Hidden Networks for Covert Communication
  6. Advanced Data Recovery Techniques
  7. Exploiting Legacy Systems and Protocols
  8. Physical Evidence Collection for Digital Forensics including forensic locksmithing

Soft Skills

  1. Writing Legal-Grade Technical Reports for Incident Response
  2. Drafting NDA-Compliant Security Findings
  3. Managing Cross-Functional Teams for Security Projects
  4. Teaching Cybersecurity Concepts to Non-Tech Audiences
  5. Applying Creative Problem-Solving in Security Challenges

Projects

Penetration Test

https://drive.google.com/file/d/1JbM-cAebrUjeWDIFhR7wE4cyax__tzzl/view?usp=sharing

Conducted a documented penetration test for a real-world environment, identifying vulnerabilities and creating actionable security recommendations. Tools included customized hardware and advanced exploitation techniques.

Reverse Shell Setup Guide

Authored a fun and educational paper on reverse shells, focusing on HUMINT applications and ethical usage. The guide was designed to be practical, engaging, and college-appropriate.

Hardware Innovation Projects

  • Built long-range Wiegand interception devices for physical security research.
  • Developed encrypted radios, tracking devices and experimented with signal interception using custom tools.
  • Developed numerous tools specifically for a Penetration Test.

Experience

  • Conducted real-world physical penetration tests, combining NDE, CMOE, Hotplug and Implant tools.
  • Drafted legal and technical documents, leveraging years of experience in a law firm to create Chimi Security Professionals.
  • Given Multiple Presentations on a variety of Cyber Operations topics.
  • Attended numerous Cybersecurity related events.

Achievements

  • Capture The Flag Participant: I complete many Capture The Flag challenges for fun, honing skills in network exploitation and ethical hacking. I particularly enjoy ones that are set up by the DOD.
  • Lockpicking Mastery: Successfully picked a purple belt-level lock, demonstrating expertise in Non-Destructive Entry (NDE).
  • Penetration Test: I have successfully completed a penetration test
  • Mad Scientist: I am consistently building and developing new tools to use for future assessments.

Contact Me

Let’s Connect: