Security Developer

Researching
to build solutions

I build security tooling, conduct research, and write about what I find. Offensive mindset, defensive output.

nahom@sec ~ zsh
whoami
nahom_wondimu

cat skills.txt
→ Penetration Testing
→ Vulnerability Research
→ Threat Intelligence
→ Security Tooling (Go/Python)
→ CTF · OSCP · Bug Bounty

./status.sh
● Available for work
40+
CVEs filed
$85k
bug bounty earnings
Top 2%
HackTheBox ranking
5+
years in security

Things I've built

Tools, research, and open source contributions across offensive and defensive security.

All on GitHub ↗

Background

I'm a security developer and researcher based in Washington, D.C. I started in network engineering before moving into offensive security, and I've spent the last 5 years doing vulnerability research, building tools, and writing about what I find.

I've done work across web application security, binary exploitation, cloud misconfigurations, and threat intelligence. I'm comfortable operating at both the exploit-dev layer and the infrastructure layer — which tends to be where the interesting bugs live.

When I'm not breaking things professionally I play CTFs, contribute to open source tooling, and maintain an Intel feed covering the threat landscape I care about.

"Nahom found a critical auth flaw in our product in 72 hours that our internal team had missed for a year. Methodical, thorough, and communicates findings clearly."

— Head of Security, Fortune 500 client

Certifications

OSCP
Offensive Security Certified Professional
CEH
Certified Ethical Hacker
GPEN
GIAC Penetration Tester
CKA
Certified Kubernetes Admin

Proficiency

Python
Go
C/C++
Bash
Rust
Assembly

Let's work together

Available for penetration testing engagements, security consulting, and tool development contracts. PGP key available on request.