Certified offensive security practitioner executing real-world attack chains network reconnaissance through full domain compromise - with business-grade reporting and zero collateral damage.
Shaping the next generation of security professionals at Monash University. Delivering FIT3031 Network Security - GNS3, IDS/IPS, firewall design, VPN protocols, and real-world attack labs.
Built on the belief that you cannot defend what you cannot break.
I am Jeeva a penetration tester, red team operator, and academic practitioner with deep expertise in offensive security and adversary simulation across enterprise environments.
Holding the OSCP+, CPTS, and CARTE certifications, I bring a rigorous, methodology-driven approach to exposing vulnerabilities before threat actors do. My engagements span web applications, Active Directory forests, network infrastructure, and full-scope red team operations.
As a Teaching Associate at Monash University, I deliver FIT3031 Network Security Labs - translating adversarial tradecraft from real engagements into structured, hands-on academic instruction. Students configure GNS3 virtual environments, author Snort detection rules, design MikroTik firewall policies, and implement IPsec and TLS protocols under my Guidance.
Proctored, practical certifications earned through real exploitation - not multiple choice.
The global benchmark in penetration testing. Validates the ability to compromise hardened targets across a 24-hour proctored lab engagement using creative exploitation and lateral movement chains. The "+" designation confirms advanced capabilities - updated exploitation scenarios and enhanced Active Directory attack coverage beyond the standard OSCP.
One of the most demanding industry certifications - a 10-day practical exam simulating a full enterprise penetration test from initial access through professional report delivery. Covers web application attacks, internal network compromise, Active Directory exploitation, and comprehensive reporting reviewed by industry professionals.
Advanced Azure red team operations across complex multi-forest Azure Active Directory environments. Covers trust relationship abuse, constrained and unconstrained delegation attacks, cross-domain lateral movement, and durable persistence techniques that survive domain controller reboots and password resets.
Bridging real-world offensive tradecraft with rigorous academic instruction at Monash University.
Delivering lab-intensive sessions, assessment supervision, and technical mentoring to undergraduate students - bringing first-hand offensive expertise into every teaching moment. Students gain hands-on exposure to real attack tooling and defensive configurations in GNS3-based virtual lab environments.
From TCP/UDP port scanning mechanics to DNS cache poisoning and firewall design, students leave with an adversarial mindset, practical Python and Scapy scripting skills, and the ability to configure enterprise-grade network security infrastructure.
A battle-tested offensive and academic stack built for real engagements and real classrooms.
Hands-on security experience across application, infrastructure, and network environments, aligned with real-world threat modelling and industry frameworks.
Performed structured security assessments of web applications and APIs, identifying exploitable vulnerabilities and mapping attack techniques to real-world threat behaviour using MITRE ATT&CK.
Conducted internal security assessments of Active Directory environments, focusing on privilege escalation paths, credential attacks, and lateral movement techniques mapped to MITRE ATT&CK.
Evaluated and validated enterprise network security controls through adversarial testing, focusing on segmentation, firewall effectiveness, and detection capabilities aligned with ISO 27001 principles.
Applied Australian cybersecurity standards to assess and prioritise security improvements, aligning technical findings with ACSC Essential Eight maturity model and organisational risk reduction goals.
All engagements operate under signed authorization and strict confidentiality. Every communication channel listed here is encrypted end-to-end.