Home About
About
Cancel

About

Siddarth Kanaparthy

**Offensive Security Specialist Red Team Operator Threat Intelligence Researcher**

LinkedIn GitHub Resume PDF Resume HTML


Summary

Offensive security professional with operational experience across enterprise red team operations, vulnerability research, threat intelligence, and computer network exploitation. Led red team engagements against Active Directory environments, cloud infrastructure, ICS/SCADA systems, mobile platforms, and air-gapped networks.

Extensive experience exploiting known and novel vulnerabilities across Windows, Linux, and network infrastructure. Developed autonomous attack methodologies achieving rapid domain compromise through multi-phase exploitation chains. Built threat intelligence platforms for nation-state APT tracking and dark web collection.

U.S. Army veteran with Intelligence Community collaboration and federal law enforcement support experience. Pioneering agentic AI applications for autonomous security operations.


Certifications

Certification Issuer Year
Offensive Security Certified Professional (OSCP) OffSec 2025
Certified Red Team Operator (CRTO) Zero Point Security 2022
Certified All-Source Intelligence Analyst McAfee Institute 2024
Certified Cryptocurrency Forensic Investigator McAfee Institute 2024

Youngest recipient of CRTO certification (age 17)


Experience

Intelligence & Reconnaissance Specialist

U.S. Army, 101st Airborne Division (Air Assault) | Sept 2022 — 2025

  • Served in specialized reconnaissance element supporting battalion-level operations
  • Delivered technical threat intelligence briefings to senior federal leadership on time-sensitive national security matters
  • Provided cyber threat intelligence support to federal law enforcement and military counterintelligence investigations
  • Developed technical threat assessments integrating multi-source intelligence with signals analysis

Red Team Operator / Consultant

Lime Security Consulting | March 2022 — Sept 2022

  • Led 8-person red team conducting adversary simulations against enterprise environments
  • Designed C2 infrastructure using Cobalt Strike, Sliver, and bespoke frameworks
  • Developed custom implants in C#, Rust, and Golang for EDR evasion
  • Executed full-scope engagements across AD, cloud, ICS/SCADA, mobile, and air-gapped networks
  • Completed Barclays Red Team Challenge Delta

Independent Security Researcher

2020 — Present

  • Discovered 20+ vulnerabilities in font rendering and graphics processing libraries
  • Built autonomous bug bounty system using Claude Code with MCP integrations
  • Architected OpenCTI threat intelligence platform for APT campaign tracking
  • Completed HackTheBox ProLabs: Offshore, RastaLabs, Dante, CyberNatic, APTLABS

Technical Skills

Offensive Security & Red Team

Red Team Leadership, Adversary Simulation, Penetration Testing, C2 Infrastructure Design, Implant Development, AV/EDR Evasion, OPSEC Methodology, Social Engineering

Testing Domains

Active Directory, Azure, AWS, GCP, ICS/SCADA, OT Networks, Mobile Applications, Air-Gapped Systems, Web Applications, APIs, Wireless Networks

Vulnerability Research

Fuzzing (AFL++, LibFuzzer, honggfuzz), Reverse Engineering, Binary Exploitation, Memory Corruption, Heap Exploitation, ROP Chains, Shellcode Development

Threat Intelligence

OpenCTI, MISP, MITRE ATT&CK, Diamond Model, Kill Chain Analysis, Dark Web Collection, APT Research, Detection Engineering

Programming

C C++ Rust Golang Python PowerShell x86/x64 Assembly C# Nim Ruby

Tools

Cobalt Strike, Sliver, HAVOC, Mythic, BloodHound, Impacket, Mimikatz, Rubeus, Burp Suite, Metasploit, Ghidra, IDA Pro, Binary Ninja


Projects

Project Description
Terror-Strike Framework Comprehensive pentesting framework with 94 Python modules for multi-phase attack automation
Autonomous Bug Bounty System XBOW-style coordinator-solver architecture using Claude Code and MCP for automated vuln discovery
AirStrike Distributed network scanning system with multi-node reconnaissance capabilities
Adversary Emulation Lab Multi-node virtualization cluster for red team tool development and malware analysis
Threat Intelligence Platform Production OpenCTI deployment with MISP integration for APT tracking

Education

Bachelor of Science, Cybersecurity (In Progress) Lipscomb University, Nashville, TN | Expected Spring 2028


Contact


Clearance: Secret (NATO) — Active TS/SCI Eligible