Senior Offensive Security & Cloud Security Engineer
Email: thaphane@gmail.com | LinkedIn: linkedin.com/in/thato-aphane-a30b514a | HackerOne: hackerone.com/thaphane | GitHub: github.com/thato-aphane
Specialist in modern offensive security, cloud defense, secure DevOps, and adversarial testing of AI-powered systems. My work bridges hands-on exploitation, defensive engineering, and future-focused cyber innovation — building security systems that are resilient against human and AI-enabled threats. I’ve secured regulated, enterprise, government, fintech, and SaaS environments — improving cyber maturity, eliminating critical risk, and enabling secure digital transformation.
Offensive Security: Red Teaming, Exploit Dev, C2, Purple Team Ops, OSINT, Social Engineering
Cloud Security: Azure Security Architecture, AWS Hardening, GCP IAM, CSPM, Zero-Trust
DevSecOps: CI/CD Security (GitHub, GitLab, Jenkins), IaC Review, Container Security
Microsoft Security: Entra ID, Intune, M365 E5, Defender XDR, Purview DLP, Conditional Access
Blue-Team Engineering: SIEM (Sentinel, Splunk), EDR, Threat Hunting, DFIR, Incident Response
Design and implement secure network and cloud architectures, integrate security into engineering workflows, and lead incident response and compliance activities.
Led penetration testing and security assessments for infrastructure, applications, and physical security, with focus on automation and methodology improvement.
Implemented and administered enterprise security solutions across on-prem and cloud environments, with focus on IAM, compliance, and security operations.
Day-to-day monitoring, investigation and response to cybersecurity alerts; automation of processes and vulnerability management.
Managed systems administration including configuration, performance tuning, and ITIL-based processes.
Outcome: Blocked 80% of identity attacks, boosted MFA adoption to 98%. Deployed a Zero-Trust identity & access model using Conditional Access, MFA, and Identity Governance. Integrated Defender for Cloud with a Sentinel SOC.
Outcome: Discovered a critical privilege escalation chain in a fintech environment. Executed a phishing simulation to gain an EntraID foothold, exploited misconfigured IAM for lateral movement, and established cloud persistence.
Outcome: Cut vulnerability remediation cycle by 60%. Automated SAST, DAST, IaC scanning, and secrets detection within GitHub and GitLab pipelines.
Outcome: Prototyped an LLM-augmented SOC for advanced threat detection. Researched and developed methods for automated intelligence parsing and adversarial prompt protection.