Available for engagements

Offensive Security
Specialist

8+ years breaking into systems so attackers can't. Specialising in penetration testing, application security, and red team operations for enterprise environments.

8+ Years Experience
200+ Pentest Engagements
OSCP Certified

// Services

What I Do

Comprehensive offensive security services tailored to identify and address vulnerabilities before adversaries exploit them.

🌐

Web & API Penetration Testing

Deep-dive assessments of web applications and APIs to uncover injection flaws, authentication bypasses, business logic vulnerabilities, and more — aligned with OWASP standards.

🏗

Infrastructure Testing

Internal and external network penetration testing to identify misconfigurations, privilege escalation paths, and exposed services across your infrastructure.

📱

Mobile Application Security

Security assessments of iOS and Android applications including static and dynamic analysis, API communication review, and data storage inspection.

☁️

Cloud Security Assessments

Configuration reviews and penetration testing across AWS, Azure, and GCP environments to identify IAM misconfigurations, exposed storage, and privilege escalation vectors.

🔴

Red Team & Purple Team

Simulated adversary operations to test your detection and response capabilities end-to-end, with collaborative purple team exercises to close gaps in real-time.

🔍

Code Review & SAST/DAST

Static and dynamic code analysis using tools like Snyk, Checkmarx, and SonarQube — triaging findings and guiding developers toward secure fixes at the source.


// About

About Me

I'm Jay Patel — an offensive security specialist with over 8 years of experience and 200+ penetration tests completed. I perform penetration tests, triage vulnerabilities, contribute to Attack Surface Management, and participate in red and purple team exercises.

My career spans enterprise consulting, government agencies, and the private bug bounty ecosystem. I've worked with Australian blue-chip companies and federal/state government, and I continue to sharpen my skills through platforms like Cobalt, Synack, and HackerOne.

I hold a Master's in Applied Information Technology from Victoria University with a specialisation in Information Security. I'm driven by a passion for understanding how systems break and helping organisations build resilience against real-world threats.

🛡

200+ Pentests Completed

Web, API, Mobile, Infrastructure, Cloud
🏆

OSCP & EWPTXv2

Industry-recognised certifications
🐛

Bug Bounty Platforms

Cobalt · Synack · HackerOne
🎓

Master's — Info Technology

Victoria University, Sydney

// Experience

Career Timeline

A track record of delivering offensive security services across enterprise, government, and startup environments.

Sep 2022 — Present

Analyst, Offensive Security

National Australia Bank · Melbourne

Leading penetration tests across web apps, APIs, and infrastructure. Participating in red/purple team exercises, triaging bug bounty and scanner findings, and supporting P1/P2 incident response through tech bridges. Conducting code analysis with Snyk and Checkmarx and coordinating remediation efforts.

Dec 2021 — Sep 2022

Technical Consultant, Pentester

DXC Technology · Australia

Performed penetration testing for Australian blue-chip companies and federal/state government agencies. Developed security test plans and consulted with developers on remediation strategies while managing concurrent assessments.

Apr 2019 — Dec 2021

Associate Consultant, Technical

DXC Technology · Australia

Conducted penetration testing for government agencies and enterprise clients. Collaborated with developers and product owners to integrate security into the development lifecycle and reviewed technical designs for security considerations.

Mar 2018 — Apr 2019

Penetration Tester

Global Garner Sales Services · India

Performed threat and vulnerability assessments on web applications and infrastructure. Managed the bug bounty program, maintained WAF configurations, and monitored security events.


// Arsenal

Tools & Technologies

The technologies and frameworks I use to identify, exploit, and help remediate security vulnerabilities.

🔧 Security Testing

Burp Suite OWASP ZAP Metasploit Nmap Nuclei SQLMap Postman Frida MobSF

🔬 SAST / DAST / SCA

Snyk Checkmarx Qualys Netsparker SonarQube

☁️ Cloud Platforms

AWS Microsoft Azure Google Cloud

💻 Languages

Python JavaScript Java Bash SQL

📋 Frameworks

OWASP Top 10 OWASP ASVS MITRE ATT&CK NIST PCI DSS

// Certifications

Credentials

OSCP

OffSec Certified Professional
🕸

EWPTXv2

Web App Pentester eXtreme
☁️

AZ-500

Azure Security Engineer
📘

Cloud Essentials

Cloud Computing Fundamentals

ISTQB CTFL

Certified Tester Foundation

// Research & Bug Bounty

Beyond the Day Job

Active contributions to the security community through bug bounty platforms, research, and published work.

Cobalt · Dec 2021 — Present

Core Lead Penetration Tester

100+ engagements on Cobalt's PtaaS platform spanning cloud, APIs, mobile, internal/external networks, and PCI-scoped systems. Lead full assessment cycles with client-facing communication.

Synack · Feb 2021 — Dec 2024

Red Team Member

Advanced vulnerability research and exploitation in Synack's curated Red Team environment, delivering real-world exploitation intelligence to top-tier enterprise clients.

HackerOne · Jan 2025 — Present

Pentester

Part of HackerOne's pentest team performing security assessments for private programs across major global organisations. All work conducted off-hours with personal tooling.

📄 Publications

Full Account Takeover via AWS Cognito Misconfiguration

Cobalt Blog
Read →

Prevention of Cross-Site Scripting Attacks in Web Applications

IEEE EECCMC Conference
IEEE

// Contact

Let's Work Together

Have a security assessment need or want to discuss an engagement? Reach out through any of the channels below.