Siddarth Kanaparthy
| **Offensive Security Specialist | Red Team Operator | Threat Intelligence Researcher** |
Summary
Offensive security professional with operational experience across enterprise red team operations, vulnerability research, threat intelligence, and computer network exploitation. Led red team engagements against Active Directory environments, cloud infrastructure, ICS/SCADA systems, mobile platforms, and air-gapped networks.
Extensive experience exploiting known and novel vulnerabilities across Windows, Linux, and network infrastructure. Developed autonomous attack methodologies achieving rapid domain compromise through multi-phase exploitation chains. Built threat intelligence platforms for nation-state APT tracking and dark web collection.
U.S. Army veteran with Intelligence Community collaboration and federal law enforcement support experience. Pioneering agentic AI applications for autonomous security operations.
Certifications
| Certification | Issuer | Year |
|---|---|---|
| Offensive Security Certified Professional (OSCP) | OffSec | 2025 |
| Certified Red Team Operator (CRTO) | Zero Point Security | 2022 |
| Certified All-Source Intelligence Analyst | McAfee Institute | 2024 |
| Certified Cryptocurrency Forensic Investigator | McAfee Institute | 2024 |
Youngest recipient of CRTO certification (age 17)
Experience
Intelligence & Reconnaissance Specialist
U.S. Army, 101st Airborne Division (Air Assault) | Sept 2022 — 2025
- Served in specialized reconnaissance element supporting battalion-level operations
- Delivered technical threat intelligence briefings to senior federal leadership on time-sensitive national security matters
- Provided cyber threat intelligence support to federal law enforcement and military counterintelligence investigations
- Developed technical threat assessments integrating multi-source intelligence with signals analysis
Red Team Operator / Consultant
Lime Security Consulting | March 2022 — Sept 2022
- Led 8-person red team conducting adversary simulations against enterprise environments
- Designed C2 infrastructure using Cobalt Strike, Sliver, and bespoke frameworks
- Developed custom implants in C#, Rust, and Golang for EDR evasion
- Executed full-scope engagements across AD, cloud, ICS/SCADA, mobile, and air-gapped networks
- Completed Barclays Red Team Challenge Delta
Independent Security Researcher
2020 — Present
- Discovered 20+ vulnerabilities in font rendering and graphics processing libraries
- Built autonomous bug bounty system using Claude Code with MCP integrations
- Architected OpenCTI threat intelligence platform for APT campaign tracking
- Completed HackTheBox ProLabs: Offshore, RastaLabs, Dante, CyberNatic, APTLABS
Technical Skills
Offensive Security & Red Team
Red Team Leadership, Adversary Simulation, Penetration Testing, C2 Infrastructure Design, Implant Development, AV/EDR Evasion, OPSEC Methodology, Social Engineering
Testing Domains
Active Directory, Azure, AWS, GCP, ICS/SCADA, OT Networks, Mobile Applications, Air-Gapped Systems, Web Applications, APIs, Wireless Networks
Vulnerability Research
Fuzzing (AFL++, LibFuzzer, honggfuzz), Reverse Engineering, Binary Exploitation, Memory Corruption, Heap Exploitation, ROP Chains, Shellcode Development
Threat Intelligence
OpenCTI, MISP, MITRE ATT&CK, Diamond Model, Kill Chain Analysis, Dark Web Collection, APT Research, Detection Engineering
Programming
C C++ Rust Golang Python PowerShell x86/x64 Assembly C# Nim Ruby
Tools
Cobalt Strike, Sliver, HAVOC, Mythic, BloodHound, Impacket, Mimikatz, Rubeus, Burp Suite, Metasploit, Ghidra, IDA Pro, Binary Ninja
Projects
| Project | Description |
|---|---|
| Terror-Strike Framework | Comprehensive pentesting framework with 94 Python modules for multi-phase attack automation |
| Autonomous Bug Bounty System | XBOW-style coordinator-solver architecture using Claude Code and MCP for automated vuln discovery |
| AirStrike | Distributed network scanning system with multi-node reconnaissance capabilities |
| Adversary Emulation Lab | Multi-node virtualization cluster for red team tool development and malware analysis |
| Threat Intelligence Platform | Production OpenCTI deployment with MISP integration for APT tracking |
Education
Bachelor of Science, Cybersecurity (In Progress) Lipscomb University, Nashville, TN | Expected Spring 2028
Contact
- Email: limeinc.official@gmail.com
- LinkedIn: linkedin.com/in/sidious07
- GitHub: github.com/LimeIncOfficial
- Location: Nashville, TN
| Clearance: Secret (NATO) — Active | TS/SCI Eligible |