Back to Developers
Keerthi TR

Keerthi TR

Offensive Security Analyst

Bangalore, India
80
Profile Score

About

Offensive Security professional with 1.5+ years of hands-on adversary simulation, penetration testing, and red team operations experience across Windows and network environments. Skilled in the full attack lifecycle — reconnaissance, exploitation, privilege escalation, lateral movement, and persistence — aligned with MITRE ATT&CK; TTPs. Proficient in Kali Linux, Metasploit, Nmap (advanced), Burp Suite, Netcat, and Hydra. Practiced Active Directory enumeration, credential attacks, and C2 framework concepts in enterprise lab environments. Currently pursuing CEH v13 with a focused path toward OSCP-level offensive tradecraft. Strong defensive background in SIEM detection logic and alert threshold analysis provides unique red team depth.

Skills & Expertise (49)

Penetration Testing Advanced
8.2/10
2
Years Exp
Offensive Security Advanced
8.0/10
2
Years Exp
MITRE ATT&CK Intermediate
7.8/10
2
Years Exp
Red Teaming Intermediate
7.6/10
2
Years Exp
Nmap Intermediate
7.4/10
2
Years Exp
PowerShell Enumeration Threat Intelligence-Led Testing WIRESHARK Splunk Cyber Kill Chain OWASP Top 10 PTES CVSS Risk Rating Exploit Validation Remediation Mapping Professional Pentest Reporting SIEM Detection Logic Alert Threshold Analysis SIEM Evasion Concepts Windows Event Log Analysis Purple Team Concepts Living-off-the-Land Assume Breach Methodology Cloud Attack Surfaces AI-Assisted OSINT Phishing Simulation Active Directory Enumeration Adversary Simulation Exploitation Post-Exploitation Privilege Escalation Lateral Movement persistence mechanisms Credential Harvesting C2 Framework Concepts Defense Evasion Techniques TTP Emulation Recon & Enumeration Mimikatz SMB Enumeration DNS Recon OSINT Techniques Attack Surface Mapping Service & Version Detection Kali Linux Metasploit Framework Burp Suite Netcat Hydra

Work Experience

Offensive Security Analyst – Red Team Operations

Hacker Academy

Nov 2023 - Apr 2025

Simulated full red team attack lifecycles — initial access, execution, privilege escalation, lateral movement, and persistence — across Windows enterprise lab environments, aligned with MITRE ATT&CK; phases. Executed brute-force and password-spraying attack simulations targeting authentication systems; identified and documented credential weaknesses across 10+ simulated enterprise hosts. Conducted advanced network reconnaissance and service enumeration using Nmap to identify open ports, misconfigurations, and exploitable attack surfaces across multi-host lab networks. Mapped 20+ adversary TTPs to MITRE ATT&CK; to emulate realistic threat actor behavior across multiple kill chain phases. Probed SIEM detection logic by triggering malicious process execution, identifying alert blind spots and defense evasion opportunities; delivered actionable hardening recommendations. Performed Active Directory enumeration and attack path analysis to identify misconfigured permissions and lateral movement vectors in simulated enterprise environments. Participated in 8+ CTF challenges covering exploitation, privilege escalation, and lateral movement, sharpening real-world offensive tradecraft. Produced professional penetration test reports with CVSS risk ratings, proof-of-concept documentation, MITRE ATT&CK; TTP mapping, and remediation guidance aligned to industry standards.

Freelance Penetration Tester

Self-Employed

Jun 2025 - Nov 2025

Conducted vulnerability assessments and penetration testing engagements across 3+ web and network environments; identified and documented 20+ vulnerabilities including misconfigurations, exposed services, and weak authentication controls. Performed port scanning, service enumeration, and attack surface analysis to identify exploitable entry points; validated findings through controlled exploitation in isolated lab environments. Recommended and implemented secure configurations — least privilege enforcement, MFA enablement, and firewall rule hardening — reducing estimated client attack surface by ~40%. Delivered structured penetration test reports with CVSS severity ratings, proof-of-concept evidence, and business-risk summaries for both technical and non-technical stakeholders.

Education

Post Graduation in Cyber Security (PG-CS) - Hacker Academy

2023 - 2025 · Afghanistan

Bachelor of Computer Application (BCA) - Bangalore City University

2020 - 2023 · Afghanistan

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 80/100

Profile Overview

Member sinceMar 2026

Availability Details

Visa Status

Citizen

Relocation

Depends on Offer

Skills (49)

Penetration Testing Offensive Security MITRE ATT&CK Red Teaming Nmap PowerShell Enumeration Threat Intelligence-Led Testing WIRESHARK Splunk Cyber Kill Chain +39 more