OFFENSIVE SECURITY · SECURITY TESTING

Offensive security.

I’m Sal Scar, a CyberOps Consultant specializing in offensive security. I perform Web, API, Mobile (Android & iOS), and Network penetration testing & vulnerability assessment, including mobile static analysis — with client-ready technical reporting.

Current role
CyberOps Consultant (Horangi/Bitdefender)
Since
2019
Deliverable
Technical reports

About

What I do and what you can expect.

Engagements

I perform penetration testing and vulnerability assessments across web applications, APIs, mobile apps (Android & iOS), and networks. When needed, I also perform static analysis on mobile applications.

Reporting & communication

I prepare detailed technical reports and present findings clearly — so teams can prioritize fixes, validate remediation, and reduce risk without guesswork.

APPROACH

Real-world impact, reproducible steps, and evidence-backed severity — every finding is useful, not noisy.

Skills

A focused toolkit for validation and delivery.

Burp Suite Postman Nessus Frida Objection

Web & API

  • Manual testing with targeted validation
  • Authentication & authorization review
  • Evidence capture and reproducible steps

Mobile

  • Android & iOS penetration testing
  • Static analysis and security review
  • Runtime instrumentation when required

Delivery

  • Clear severity and remediation guidance
  • Executive summary + technical detail
  • Stakeholder-ready presentation of findings

Experience

Roles and responsibilities (from CV).

CyberOps Consultant

Oct 2021 — Present · Horangi Cyber Security (Bitdefender)

  • Perform Web, Mobile (Android & iOS), Network and API penetration testing and vulnerability assessment.
  • Perform static analysis on mobile devices.
  • Prepare detailed technical reports based on testing results.
  • Communicate and present findings to clients.

IT Security Engineer

Jun 2020 — Sep 2021

  • Perform Web and Mobile penetration testing and vulnerability assessment.
  • Monitor source code to identify and safeguard sensitive information.
  • Compile monthly reports on security incidents.
  • Validate bug bounty submissions.

Cyber Security Analyst Intern

Feb 2019 — Feb 2020

  • Investigate digital cases using digital forensic tools.
  • Assist co-workers with vulnerability assessments and penetration tests.
  • Research collaboration strategies between Blue Team and Red Team.

Projects

Selected open-source work from GitHub.

Live data loads from the GitHub API. If it can’t load, you’ll still see a curated snapshot.

session-burner

Shell

A speed-first Tor burner browsing launcher for Linux systems that can’t run Tor Browser.

★ 7 MIT
View on GitHub

frida-bypass-automation

Python

Automates testing Frida scripts to bypass root detection & SSL pinning in mobile apps.

★ 5
View on GitHub

medusa

Shell

Demonstrates network-based resource exhaustion risks in certain IoT cameras (AltoBeam/V380).

★ 4 MIT
View on GitHub

Certifications

Recognized credentials.

OSCP

Offensive Security Certified Professional — OFFSEC

Issued July 2024

CRTO

Certified Red Team Operator — Zero-Point Security Ltd

Issued December 2024

ISO/IEC 27001

Certified ISO/IEC 27001:2013 Lead Auditor — IRCA

Issued July 2022

CEH

Certified Ethical Hacker — EC-COUNCIL

Issued July 2020

Contact

Reach out via email for scope and availability.

Email

Fastest way to reach me:

WHAT TO INCLUDE

  • Scope (web / API / mobile / network)
  • Environment (prod, staging, test accounts)
  • Desired output (report, retest, workshop)

Availability

I can usually start within 1–2 weeks depending on scope. Fast-turn retests are available when fixes are ready.

DELIVERABLES

  • Executive summary + technical details
  • Reproduction steps and evidence
  • Remediation guidance and retest notes