JEEVA
Establishing Secure Session…
Pentester · Red Team Operator · Security Educator

JEEVA

Teaching Associate
Monash University
Network Security
Red Team Operator
OSCP+
CPTS
CARTE
Scroll
⚔️ Professional Practice
Adversary.
Simulator.

Certified offensive security practitioner executing real-world attack chains network reconnaissance through full domain compromise - with business-grade reporting and zero collateral damage.

🎓 Academic Role · Monash University
Teaching
Associate.

Shaping the next generation of security professionals at Monash University. Delivering FIT3031 Network Security - GNS3, IDS/IPS, firewall design, VPN protocols, and real-world attack labs.

01 - Operator Profile

Authorized to Break

Built on the belief that you cannot defend what you cannot break.

I am Jeeva a penetration tester, red team operator, and academic practitioner with deep expertise in offensive security and adversary simulation across enterprise environments.

Holding the OSCP+, CPTS, and CARTE certifications, I bring a rigorous, methodology-driven approach to exposing vulnerabilities before threat actors do. My engagements span web applications, Active Directory forests, network infrastructure, and full-scope red team operations.

As a Teaching Associate at Monash University, I deliver FIT3031 Network Security Labs - translating adversarial tradecraft from real engagements into structured, hands-on academic instruction. Students configure GNS3 virtual environments, author Snort detection rules, design MikroTik firewall policies, and implement IPsec and TLS protocols under my Guidance.

Academic Appointment
Monash University
Teaching Associate - FIT3031 Network Security
GNS3
Snort IDS/IPS
MikroTik Firewall
IPsec VPN
TLS/SSL
TCP/UDP Scanning
DNS Attacks
Wireshark
Scapy
Network Topology
3+
Certifications
OSCP+ · CPTS · CARTE
100%
Practical Exam Pass Rate
All exams passed first attempt
FIT
3031
Network Security Unit
Monash University · Melbourne
AD
Active Directory Specialist
Multi-forest enterprise exploitation
0
Unresolved Critical Findings
Every engagement fully documented
Credentials

Forged Under Fire

Proctored, practical certifications earned through real exploitation - not multiple choice.

01
⚔️
Offensive Security
OSCP+
Offensive Security Certified Professional+

The global benchmark in penetration testing. Validates the ability to compromise hardened targets across a 24-hour proctored lab engagement using creative exploitation and lateral movement chains. The "+" designation confirms advanced capabilities - updated exploitation scenarios and enhanced Active Directory attack coverage beyond the standard OSCP.

Active · Verified
02
🎯
Hack The Box Academy
CPTS
Certified Penetration Testing Specialist

One of the most demanding industry certifications - a 10-day practical exam simulating a full enterprise penetration test from initial access through professional report delivery. Covers web application attacks, internal network compromise, Active Directory exploitation, and comprehensive reporting reviewed by industry professionals.

Active · Verified
03
🔴
Altered Security
CARTE
Certified Red Team Expert

Advanced Azure red team operations across complex multi-forest Azure Active Directory environments. Covers trust relationship abuse, constrained and unconstrained delegation attacks, cross-domain lateral movement, and durable persistence techniques that survive domain controller reboots and password resets.

Active · Verified
Academia

Network Security Education

Bridging real-world offensive tradecraft with rigorous academic instruction at Monash University.

Clayton Campus · Melbourne, Australia
Teaching Associate
FIT3031 - Network Security

Delivering lab-intensive sessions, assessment supervision, and technical mentoring to undergraduate students - bringing first-hand offensive expertise into every teaching moment. Students gain hands-on exposure to real attack tooling and defensive configurations in GNS3-based virtual lab environments.

What Students Learn
Practical · Lab-Driven · Industry-Aligned

From TCP/UDP port scanning mechanics to DNS cache poisoning and firewall design, students leave with an adversarial mindset, practical Python and Scapy scripting skills, and the ability to configure enterprise-grade network security infrastructure.

🖧
GNS3 Network Simulation
Topology design · Virtual lab deployment · Router & switch config
🛡️
Snort IDS/IPS
Rule authoring · Signature-based detection · Inline prevention mode
🔥
MikroTik Firewall
RouterOS · Firewall chains · NAT · Access control lists
🔒
IPsec VPN
IKEv2 · Tunnel & transport mode · PSK & certificate authentication
🔐
TLS / SSL
Handshake analysis · Certificate validation · Protocol downgrade attacks
📡
TCP/UDP Scanning Techniques
SYN scans · Evasion · Rate limiting · Distributed scanning
🌐
DNS Attacks & Spoofing
Cache poisoning · NS record hijacking · Scapy-based exploitation
🔬
Wireshark Traffic Analysis
Protocol dissection · Attack pattern identification · Forensic capture
Technical Arsenal

Tools of the Trade

A battle-tested offensive and academic stack built for real engagements and real classrooms.

Network & AD Attacks
Active Directory Exploitation
Network Reconnaissance
Privilege Escalation
Lateral Movement
MikroTik / Firewalls
Web Application
OWASP Top 10
API Security Testing
Authentication Bypass
DNS Attacks · Scapy
TLS / IPsec Analysis
Red Team Ops
C2 Infrastructure
AV/EDR Evasion
Snort IDS/IPS Bypass
OPSEC & Tradecraft
GNS3 Lab Engineering
Tooling & Frameworks
Metasploit
Cobalt Strike
BloodHound
Impacket
Mimikatz
Burp Suite Pro
Nmap
Scapy
CrackMapExec
Rubeus
PowerView
Wireshark
Snort
GNS3
MikroTik RouterOS
Responder
Havoc C2
Ligolo-ng
Kerbrute
Hashcat
ffuf
Evil-WinRM
Python3
WinPEAS/LinPEAS
OpenSSL
tcpdump
Proof of Work

Selected Security Experience

Hands-on security experience across application, infrastructure, and network environments, aligned with real-world threat modelling and industry frameworks.

🌐
Web Application & API Security Testing
OWASP · MITRE ATT&CK · Manual Exploitation

Performed structured security assessments of web applications and APIs, identifying exploitable vulnerabilities and mapping attack techniques to real-world threat behaviour using MITRE ATT&CK.

  • Identified injection, XSS, IDOR, and authentication flaws
  • Validated impact through manual exploitation techniques
  • Mapped findings to MITRE ATT&CK techniques for adversary context
  • Provided remediation guidance aligned with OWASP Top 10
Burp Suite · MITRE ATT&CK
🏢
Active Directory Security Assessment
Privilege Escalation · MITRE ATT&CK · Enterprise Security

Conducted internal security assessments of Active Directory environments, focusing on privilege escalation paths, credential attacks, and lateral movement techniques mapped to MITRE ATT&CK.

  • Performed Kerberoasting and credential-based attacks
  • Analysed attack paths using BloodHound
  • Identified misconfigurations enabling privilege escalation
  • Mapped attack techniques to MITRE ATT&CK framework
AD Security · BloodHound · MITRE ATT&CK
🛡️
Network Security & Infrastructure Testing
Firewall · IDS/IPS · ISO 27001 Alignment

Evaluated and validated enterprise network security controls through adversarial testing, focusing on segmentation, firewall effectiveness, and detection capabilities aligned with ISO 27001 principles.

  • Tested firewall rules, VLAN segmentation, and network exposure
  • Assessed IDS/IPS detection capabilities (Snort)
  • Validated secure configuration of infrastructure environments
  • Mapped security controls to ISO 27001 and NIST CSF principles
Wireshark · Snort · ISO 27001
🇦🇺
Australian Security Framework Alignment
ACSC Essential Eight · Risk-Based Security

Applied Australian cybersecurity standards to assess and prioritise security improvements, aligning technical findings with ACSC Essential Eight maturity model and organisational risk reduction goals.

  • Mapped security gaps to Essential Eight controls
  • Performed risk-based prioritisation of vulnerabilities
  • Translated technical findings into business risk context
  • Aligned security posture improvements with ISO 27001 concepts
ACSC · Essential Eight · ISO 27001

Initiate Contact

All engagements operate under signed authorization and strict confidentiality. Every communication channel listed here is encrypted end-to-end.

SEC·FEED
[ STATUS ] Accepting engagements · All systems operational [ ROLE ] Teaching Associate · Monash University · FIT3031 Network Security [ CERT ] OSCP+ · CPTS · CARTE - Active & Verified [ SPEC ] AD Exploitation · Web Apps · GNS3 · Snort IDS/IPS · MikroTik · IPsec · TLS [ POLICY ] All engagements conducted under signed legal authorization only [ STATUS ] Accepting engagements · All systems operational [ ROLE ] Teaching Associate · Monash University · FIT3031 Network Security [ CERT ] OSCP+ · CPTS · CARTE - Active & Verified [ SPEC ] AD Exploitation · Web Apps · GNS3 · Snort IDS/IPS · MikroTik · IPsec · TLS [ POLICY ] All engagements conducted under signed legal authorization only