██╗ ██╗██╗████████╗███████╗ █████╗ ███╗ ██╗ █████╗
██║ ██╔╝██║╚══██╔══╝██╔════╝██╔══██╗████╗ ██║██╔══██╗
█████╔╝ ██║ ██║ ███████╗███████║██╔██╗ ██║███████║
██╔═██╗ ██║ ██║ ╚════██║██╔══██║██║╚██╗██║██╔══██║
██║ ██╗██║ ██║ ███████║██║ ██║██║ ╚████║██║ ██║
╚═╝ ╚═╝╚═╝ ╚═╝ ╚══════╝╚═╝ ╚═╝╚═╝ ╚═══╝╚═╝ ╚═╝
Systems Engineer · Penetration Tester · Offensive Security · Network Engineer
I'm a Penetration Tester, Systems Engineer, and Cybersecurity Researcher who approaches every network, application, and system through the eyes of an attacker because understanding how things break is the only way to truly secure them.
With a foundation in IT Security Management, Endpoint Protection, and formal training in Ethical Hacking, I operate at the intersection of offensive research and secure engineering. Whether I'm mapping attack surfaces, hardening API layers, or building automation tooling for vulnerability analysis, the goal is always the same: eliminate blind spots before adversaries find them.
Currently studying at the Boston Institute of Analytics with a specialization in Cybersecurity & Ethical Hacking, and holding an Associate's Degree in Information Technology from the University of Acacia I pair academic rigor with hands-on lab practice across real-world attack scenarios.
| Domain | Scope |
|---|---|
| Offensive Security | Network reconnaissance, vulnerability research, credential interception in authorized lab environments |
| Network Engineering | Traffic analysis, protocol exploitation, lateral movement simulation |
| Defensive Architecture | Hardened endpoints, encrypted API surfaces, zero-trust principles |
| Research | NTLMv2 hash analysis, Responder-based interception, automated CVE scanning |
| Secure Development | Threat-modeled application design, secure B2C/SaaS architecture |
Security & Infrastructure
Development Stack
Tools & Environment
[LAB] NTLMv2 Hash Interception → Responder + Hashcat pipeline in isolated AD environments
[LAB] Network Reconnaissance Workflow → Nmap scripting engine (NSE) + custom enumeration scripts
[LAB] Vulnerability Scanning Automation → Python-driven CVE triage and report generation
[LAB] Credential Attack Surfaces → SMB relay attacks, pass-the-hash techniques (authorized)
[LAB] Secure API Hardening → Token rotation, rate-limiting, and anomaly detection layers
⚠️ All offensive research is conducted in authorized, isolated lab environments for educational and professional development purposes.
┌──────────────────────────────────────────────────────────────────────────┐
│ INSTITUTION Boston Institute of Analytics │
│ QUALIFICATION Cybersecurity Specialization & Ethical Hacking |
│ FOCUS AREAS Penetration Testing · Threat Intelligence · │
│ Exploit Development · Ethical Hacking Methodology │
└──────────────────────────────────────────────────────────────────────────┘
┌──────────────────────────────────────────────────────────────────────────┐
│ INSTITUTION University of Acacia │
│ QUALIFICATION Associate's Degree — Information Technology │
│ PERIOD Feb 2023 – Jul 2025 │
│ FOCUS AREAS Network Infrastructure · Systems Administration · │
│ Software Engineering Fundamentals · IT Security │
└──────────────────────────────────────────────────────────────────────────┘
$ verify --credentials kitsana.thuekoh --issuer all
[✔] Resolving credential chain...
[✔] Cross-referencing issuing authorities...
[✔] All credentials verified.| Badge | Certification | Issuing Body | Issued | Core Competencies |
|---|---|---|---|---|
| 🔵 | Endpoint Security | Cisco — Credly Verified | Aug 2024 |
Endpoint threat detection & response, EDR/XDR fundamentals, malware triage, network access control policy enforcement, host-based intrusion prevention |
| 🟢 | Advanced Full Stack Development | Industry Certified | NOV 2025 |
Secure SDLC, API threat modeling, injection prevention, auth architecture, encrypted data transport |
| 🔐 | IT Security Management | Industry Certified | JUN 2025 |
Risk assessment frameworks (NIST/ISO), security governance, incident response lifecycle, audit & compliance alignment |
| 🛡️ | Endpoint Protection Specialist | Industry Certified | AUG 2024 |
DLP policy design, host hardening, vulnerability lifecycle management, HIDS configuration, attack surface reduction |
| 🧠 | Data Structures & Algorithms | Industry Certified | NOV 2025 |
Algorithmic complexity analysis, optimized data pipelines for security tooling, graph traversal for network mapping |
- 🔍 Deepening expertise in Active Directory attack paths and mitigation strategies
- 🧪 Building automated lab rebuild scripts for rapid, clean pentesting environments
- 🛡️ Researching secure-by-default SaaS architecture patterns
- ⌨️ Refining terminal workflows:
Neovim+tmux+ customZSHfor offensive ops efficiency
=