Skip to content
View joseguzman1337's full-sized avatar
:octocat:
i+d
:octocat:
i+d

Block or report joseguzman1337

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
joseguzman1337/README.md

👋 Hi, I'm ҉αkα x⠠⠵ 4k4xs4pH1r3

Typing SVG

🛡️ Professional Summary

Cybersecurity and Threat Intelligence with over 23 years of experience architecting resilient defenses and delivering actionable intelligence for global enterprises and financial institutions. My expertise lies in transforming complex cyber risks into strategic advantages by integrating an "attacker's mindset"—validated by top-tier HackerOne rankings—with robust security architecture and executive-level threat reporting.

🎯 Specializations

  • 🔍 Threat Intelligence & Hunting - Dark Web/OSINT analysis, TTP tracking, proactive threat hunting
  • 🏗️ Security Architecture & Engineering - NIST/ISO 27001 frameworks, cloud transformations (AWS, Azure)
  • 🏴‍☠️ Offensive & Proactive Security - Ethical hacking, bug bounty programs, CTF competitions
  • 📋 Governance, Risk & Compliance (GRC) - Policy creation, certifications (PCI, SOC2 for FedRamp)
  • 🔐 Identity & Access Management (IAM) - Zero Trust RBAC, SSO/MFA, Privileged Access Management
  • 🚀 DevSecOps & Cloud Security - CI/CD security integration, containerized environments (K8s, Docker)

Portfolio Website

🚀 Current Focus

const currentWork = {
    research: ["XSS Vulnerabilities", "Web App Security", "OWASP Top 10"],
    platforms: ["HackerOne", "Bugcrowd", "TryHackMe", "HackTheBox"],
    learning: ["Advanced Penetration Testing", "Red Team Operations"],
    building: ["Security Automation Tools", "Vulnerability Scanners"]
};

🛠️ Enterprise Security Arsenal

🔍 Threat Intelligence & Hunting Tools

IBM X-Force Google Chronicle FireEye Mandiant VirusTotal

🛡️ Security Architecture & Tools

Burp Suite OWASP ZAP Metasploit Wireshark Nmap

🤖 AI Security & Automation

Python JavaScript Bash PowerShell

☁️ Cloud & Infrastructure Security

AWS Azure Kubernetes Docker

💻 Operating Systems & Environments

Linux Kali Linux Windows

🏆 Elite Achievements & Industry Recognition

Bug Bounty Excellence + HackerOne Top Rankings

HackerOne Website

  • 🎖️ Critical Findings: XSS vulnerabilities, Authentication bypasses, AI model exploits
  • 🔥 Specializations: Stored XSS, DOM-based XSS, Advanced payload techniques
  • 🥇 Top ranked in Colombia (Q4 2020, Q3 2021, Q4 2024, Q4 2025)
  • 🎯 Active HackTheBox competitor with advanced penetration testing skills
  • 🔍 Pop-up window stored XSS discoveries via advanced payload techniques

📈 Current Learning Path

graph LR
    A[Web Security] --> B[Advanced XSS]
    B --> C[Mobile Security]
    C --> D[Cloud Security]
    D --> E[Red Team Operations]
Loading

🤝 Looking to Collaborate On

  • 🎯 Bug Bounty Programs - Joint vulnerability research
  • 🏗️ Security Tool Development - Open source security projects
  • 📚 Educational Content - Security awareness and training
  • 🔬 Research Projects - Novel attack vectors and defenses

Profile Views

"Security is not a product, but a process." - Bruce Schneier

Pinned Loading

  1. offensive-security offensive-security Public

    PurpleTeam

    Python 6 2

  2. termux termux Public

    Forked from Auxilus/unstable-packages

    A place for new or unstable packages.

    Shell 34 11

  3. Flipper-Zero Flipper-Zero Public

    Multi-tool Device for Geeks

    C 105 4

  4. Momentum-Firmware Momentum-Firmware Public

    🐬 Feature-rich, stable and customizable Flipper Firmware

    C 1 1