Welcome, I'm Chidubem-Chukwu
Offensive security expert
I’m an Offensive Security Expert specializing in penetration testing, AI red teaming, and comprehensive Web2/Web3 vulnerability security research including malware analysis, exploit development, and reverse engineering. With 2×CVE, I focus on uncovering vulnerabilities, advancing offensive security testing methodologies, and contributing to the global cybersecurity community.

MyPhilosophy
“Pentesting isn't about breaking the system; it's about outsmarting tomorrow's hackers.”
Chidubem Chukwu
Offensive Security Expertise

Network Penetration Testing
Identify and exploit weaknesses in network architecture to assess real-world exposure and resilience.

Infrastructure Penetration Testing
Simulate advanced intrusions across internal systems, Active Directory, and critical infrastructure assets.

Web Application Penetration Testing
Test web apps for injection flaws, and logic vulnerabilities through advanced adversarial techniques.

Mobile Application Penetration Testing
Analyze Android and iOS apps for data leaks, insecure APIs, and runtime exploitation risks.

Physical Penetration Testing
Evaluate facility and hardware security by simulating on-site attacks, and social engineering scenarios.
Advanced Adversarial Security
AI Red Teaming
I conduct advanced AI red teaming to simulate intelligent, adaptive adversaries capable of exploiting vulnerabilities in AI models, prompts, and integrated systems. My focus is on understanding how AI can both defend and be deceived using automation, model analysis, and adversarial techniques to strengthen the resilience of machine learning and large language model deployments.
Web3 Security Research
I perform in-depth Web3 security research focused on uncovering vulnerabilities within decentralized platforms, smart contracts, and blockchain infrastructures. Through exploit simulation, auditing, and adversarial analysis, I work to identify critical flaws and enhance the security posture of next-generation decentralized ecosystems.
Programming Skills
Proficient in multiple programming frameworks and tools, I develop automation scripts, backend systems, and integrations that power scalable exploit tooling, red-team workflows, and defensive automation, while applying AI-driven techniques and Web3 research to discover, validate, and remediate complex vulnerabilities across infrastructure, applications, and decentralized platforms. Experienced in leading tools and features end-to-end from secure design and coding to testing, deployment, and continuous improvement.
python
80%C Programming
50%Bash / Shell
90%JavaScript
75%Git / GitHub
100%HTML / CSS
80%Linux
100%Education & Experience
Education
2024-current
Bachelor in Cyber Security
University of North Carolina at Pembroke
2024 - 2024
Bachelor in Computer Science
University Of Memphis
Experience
2020 - 2023
Fornesic investigator
Worked as a Forensic Investigator, specializing in the recovery and analysis of digital evidence to support both criminal and financial investigations. Responsibilities included recovering deleted files, analyzing computer and mobile device data, and tracing digital activity to uncover evidence of fraud, cybercrime, and other unlawful activity. Conducted in-depth examinations of electronic devices, prepared detailed forensic reports, and provided technical support to investigative teams. Applied advanced forensic tools and methodologies to ensure the integrity, accuracy, and admissibility of digital evidence in legal proceedings.
LLS
2022 - 2023
Penetration Tester
Performed penetration testing engagements with a strong focus on exploitation, including web application attacks (SQLI, XSS, authentication bypass, insecure deserialization, RCE) as well as network and infrastructure vulnerabilities. Conducted privilege escalation, post-exploitation activities, and delivered detailed reports with proof-of-concept exploits and remediation step
Morris Int
2023 - 2024
Penetration Tester
I conducted vulnerability assessments, simulated real-world attacks, performed network and web application penetration tests, identified misconfigurations, tested endpoint security, and evaluated access controls at this law firm in Nigeria. I collaborated with the IT team to strengthen internal defenses, which reduced risk exposure, improved incident readiness, and ensured compliance with cybersecurity best practices.
Adeh Leonard & Co
2025-current
Soc analyst & Penetration Tester
In my role as a SOC Analyst and Penetration Tester at UNCP, I am responsible for monitoring and responding to security threats across the university’s network using Endpoint XDR and other security monitoring tools. I investigate suspicious activity, perform in-depth analysis of alerts, and take necessary actions to contain, escalate, or remediate threats based on established SOC procedures. My responsibilities also include conducting internal vulnerability assessments to identify and address system weaknesses, as well as performing penetration testing exercises to simulate real-world attack scenarios. I work closely with IT and network teams to ensure proper incident response, improve system defenses, and enhance threat visibility. My work bridges both blue team (defensive) and red team (offensive) practices, contributing to a stronger and more proactive security posture across the organization
University of North Carolina at Pembroke
Certification & Achievements

Google — 2024



