╭────┬───────╮ │ │ │ │ │ │ ├────╯ │ │ ╭────┤ │ │ │ ├───┬───┤ │ │ │ │ │ ╰───┴───┴────╯
elliot@hyprfolio
────────────────────
Location : New York, NY
Specialization : Penetration Testing
Clearance : root
Uptime : 7y in cybersec
Role : Cybersecurity Engineer
Cybersecurity engineer at Allsafe Cybersecurity, where I protect some of the largest corporations in the world from threats they never see coming. I specialize in penetration testing, network defense, and vulnerability research. Most of my work happens in a terminal — I write custom tools, tear apart exploits, and harden infrastructure that other people assume is already secure. I believe security is not a product, it is a process. And I take that process seriously.
* Kali Linux is my daily driver — has been for years
* I have a mass mail server running in my apartment closet
* My fish is named Qwerty and he is a good listener
* I use ProtonMail and Signal exclusively — nothing else
* I route everything through Tor out of principle
* I have never had a social media account
* I once wiped a production server by accident on my first week at Allsafe
Skills Monitor
Offensive Security
Defensive Security
Systems & Tools
Languages
1 commit 406fdf7 (HEAD -> main)
2 Author: Elliot Alderson <elliot@protonmail.ch>
3
4 Date: 2014-03 — present
5 Origin: New York, NY
6
7 Cybersecurity Engineer @ Allsafe Cybersecurity
8 Senior security engineer protecting E Corp and other Fortune 500 clients from cyber threats.
9 - Detected and mitigated a critical rootkit on E Corp servers, preventing a major data breach
10 - Performed penetration testing across client networks, identifying 200+ vulnerabilities
11 - Built custom Python intrusion detection scripts reducing threat response time by 80%
12 - Managed firewall rules and IDS/IPS configurations for enterprise-scale infrastructure
13
14 Date: 2012-01 — 2014-02
15 Origin: New York, NY
16
17 Security Consultant @ Freelance
18 Independent security researcher and penetration tester.
19 - Conducted vulnerability assessments for small businesses and startups
20 - Developed custom exploit proof-of-concepts for responsible disclosure
21 - Built network monitoring tools in Python and C for threat detection
22 - Performed social engineering audits to evaluate physical and digital security posture
23
24 Date: 2008-01 — 2011-12
25 Origin: Washington Township, NJ
26
27 Independent Security Researcher @ Self-Taught
28 Years of self-directed study in offensive and defensive security.
29 - Contributed to open-source Linux security tools
30 - Studied cryptography, reverse engineering, and exploit development
31 - Built a home lab for practicing network security and malware analysis
Collection of custom penetration testing and network reconnaissance utilities.
PythonCShell
Certifications
├─ Offensive Security Certified Professional (OSCP) (2013-08)
├─ Certified Ethical Hacker (CEH) (2012-04)
├─ CompTIA Security+ (2011-06)
└─ CompTIA Network+ (2010-09)
Offensive Security 2012 — 2013
Professional Training · Penetration Testing with Kali Linux
Exploit Development , Web Application Attacks , Privilege Escalation , Active Directory Attacks
CUNY College of Technology 2006 — 2008
Coursework (Did Not Complete) · Computer Science
Computer Networks , Operating Systems , Data Structures & Algorithms , Cryptography
Self-Directed Study 2004 — present
Ongoing · Security Research & Exploit Development
Reverse Engineering , Malware Analysis , Network Protocol Analysis , Wireless Security