Understanding Zero Trust Architecture
Exploring the core principles of Zero Trust and how to implement them in modern environments.
Read More →Ethical Hacker and Security Researcher focused on identifying vulnerabilities, defending networks, and building secure-by-design applications.
Projects Completed
Core Domains
Commitment
Batya Boyo
Ethical Hacker & Security Researcher
I specialize in ethical hacking, penetration testing, and offensive security operations. My focus is on identifying and mitigating security risks before they can be exploited by malicious actors.
I combine hands-on experience in web application security, network exploitation, and vulnerability research with a deep understanding of secure coding practices to provide comprehensive security assessments.
Offensive Security: Penetration testing, vulnerability research, and exploit development
Methodology: Following PTES and OWASP standards to deliver high-quality security assessments
Goal: Helping organizations strengthen their security posture through realistic attack simulations
Established deep technical roots in network administration and development. Built full-stack applications with an early focus on secure design principles and protocol fundamentals.
Transitioned into specialized security operations. Focused on SOC methodology, incident response, and threat detection. Earned foundational certifications to validate technical security skills (CompTIA Security+, eJPT).
Currently executing real-world penetration testing engagements and high-level vulnerability research. Deepening expertise in Active Directory exploitation and advanced C2 framework development while pursuing OSCP Mastery.
Moving toward advanced adversary simulation and custom exploit research. Aiming to lead technical red team operations and contribute original vulnerability research to the security community.
Offensive Security Certified Professional
eLearnSecurity Junior Penetration Tester
CompTIA Security+ (SY0-701)
Secure Web Development Certification
Exploring the core principles of Zero Trust and how to implement them in modern environments.
Read More →A deep dive into authentication and authorization best practices for Django APIs.
Read More →How automated tools are changing the landscape of offensive security operations.
Read More →I'm actively seeking roles in cybersecurity operations, security engineering, and full-stack development. Whether you have a position, project, or just want to connect, I'd love to hear from you.