❓ Introduction
Hey — I'm Kismet. Security engineer with a deep offensive focus, working toward the OSCP while hunting bugs and building tools. I've held a CompTIA PenTest+ and spend most of my time breaking web applications, writing about what I find, and thinking adversarially about systems that were never meant to be thought about that way.
Security for me is one connected discipline. The offensive mindset — the habit of looking for what's wrong before anyone else does — is useful everywhere: in detection engineering, in threat intelligence, in understanding why a SOC analyst misses something. I'm not locked into one lane.
💻 Infosec — about 80% of my life
No mentor, no blueprint. I started with curiosity, a lot of late nights on TryHackMe, and a refusal to give up on things I didn't understand yet. That turned into a methodology. The methodology turned into results.
My work covers web application pentesting, vulnerability research, and bug bounty hunting. I've done responsible disclosure work, found things others missed, and built tools to automate the boring parts so I can spend more time on the interesting ones.
One of those tools is a HYIP intelligence scanner — an automated system for classifying Ponzi schemes and scam brokers by scoring risk signals across discovery sources. It turns out that security thinking and financial fraud share a lot of DNA. Recon, pattern recognition, signal-to-noise filtering — same muscle, different target.
Platforms: HackerOne, Bugcrowd. If a program is interesting and in scope, I'm there.
🏅 Certifications & Skills
🌍 Outside security — the other 20%
I think about things that aren't on any cert syllabus. Philosophy of mind — the hard problem of consciousness, panpsychism, why subjective experience is so hard to explain in physical terms. Social psychology too: Cialdini, Kahneman, Aronson. Understanding how people think isn't separate from understanding how systems fail. It's the same muscle.
I'm the firstborn in my household, which means I know something about carrying weight and staying focused under pressure. That bleeds into how I approach hard problems — methodically, without panic, with a clear idea of what actually matters.
Based in Nigeria 🇳🇬, heading to Lagos. Work remotely. Think globally.
✨ Future plans
Short term: finish OSCP. Then go deeper into red team — adversary simulation, full kill chains, not just entry points. I want to understand the complete picture from the attacker's perspective, because that's the only way the defender's perspective makes sense.
Longer term: I want to be the kind of security professional who can walk into any room — offensive, defensive, intelligence, research — and contribute. The people I respect most in this field don't just know one side of the fence.
The goal isn't to be the best in the room. It's to keep learning until the room keeps getting bigger.