Red Team Operator, Bloomberg L.P.
Sep, 2022 - Present
As an internal red team operator, I conducted covert and overt adversary
emulation to identify security risks, report them and work with security
and engineering groups to remediate the vulnerabilities and improve
overal security posture of the company.
Conducted comprehensive red team engagements, simulating advanced persistent threats (APTs) to assess and improve Bloomberg's infrastructure and application security posture.
Achieved critical impact in assessments by exploiting deserialization vulnerabilities, misconfigurations, command injection vulnerabilities, etc., leading to full compromise of high-value assets and network pivoting across isolated segments.
Successfully compromised AWS EKS clusters through misconfigured IAM policies, demonstrating advanced cloud security penetration testing skills and improving cloud security practices.
Developed custom offensive tooling, including ICMP and RDP proxies, to navigate restrictive network environments and enhance lateral movement capabilities during assessments.
Executed advanced Active Directory attacks including Kerberoasting and AD Certificate Services exploitation, achieving domain-level compromise in complex environments.
Performed vulnerability research on third-party software and critical infrastructure, discovering high-impact vulnerabilities in email security systems, authentication mechanisms, and proxy services.
Led successful phishing and MitM campaigns.
Researched, developed, and integrated automation tools to streamline Red Team operations, significantly improving assessment efficiency and reporting processes.
Presented technical findings to engineering audiences of over 100, enhancing security awareness and promoting best practices across the organization.
Led the initiative to adopt secret detection tools across product teams, strengthening secret management practices and overall security posture.
Collaborated with TVM and CSOC teams to address security incidents and implement remediation strategies for identified vulnerabilities.
Implemented proof-of-concepts and scanners for critical vulnerabilities in open-source libraries, collaborated with security and engineering teams to promptly remediate the issues.