Skip to content
View joseguzman1337's full-sized avatar
:octocat:
i+d
:octocat:
i+d

Block or report joseguzman1337

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
joseguzman1337/README.md

Hi, I'm ҉αkα x⠠⠵ 4k4xs4pH1r3

Typing SVG

Professional Summary

Cybersecurity and threat intelligence leader with 23+ years of experience across enterprise defense, offensive testing, cloud security, and executive risk reporting. Work is centered on applying an attacker's mindset to practical security engineering, threat visibility, and resilient architecture.

Focus Areas

Threat Intelligence & Hunting
OSINT, dark web monitoring, TTP tracking, and proactive hunting
Security Architecture
NIST, ISO 27001, cloud security across AWS and Azure
Offensive Security
Bug bounty, ethical hacking, XSS research, and validation of web and AI attack paths
DevSecOps & IAM
CI/CD security, Zero Trust access models, PAM, SSO, and MFA
Portfolio Website
Portfolio Website
joseguzman1337.github.io/joseguzman1337
Focus Snapshot
Enterprise defense, offensive testing, cloud security, AI security, and executive risk reporting

Current Work

const currentWork = {
  research: ["XSS", "Web App Security", "OWASP Top 10"],
  platforms: ["HackerOne", "Bugcrowd", "TryHackMe", "HackTheBox"],
  learning: ["Advanced Penetration Testing", "Red Team Operations"],
  building: ["Security Automation Tools", "Vulnerability Scanners"]
};

Tools & Platforms

Threat Intelligence

IBM X-Force Google Chronicle VirusTotal

Security Testing

Burp Suite OWASP ZAP Metasploit Wireshark Nmap

Engineering & Cloud

Python JavaScript Bash AWS Azure Kubernetes Docker

Recognition & Collaboration

Recognition
  • Top ranked in Colombia on HackerOne in Q4 2020, Q3 2021, Q4 2024, and Q4 2025
  • Specializations in stored XSS, DOM XSS, authentication abuse, and advanced payload techniques
  • Active labs and practice across HackTheBox, TryHackMe, and web application research
Collaboration
  • Bug bounty collaboration
  • Security tool development
  • Security education and awareness content
  • Research into emerging attack paths and defenses

"Security is not a product, but a process." - Bruce Schneier

Pinned Loading

  1. offensive-security offensive-security Public

    PurpleTeam

    5 2

  2. termux termux Public

    Forked from Auxilus/unstable-packages

    A place for new or unstable packages.

    Shell 35 11

  3. Flipper-Zero Flipper-Zero Public

    Multi-tool Device for Geeks

    C 110 4

  4. Momentum-Firmware Momentum-Firmware Public

    🐬 Feature-rich, stable and customizable Flipper Firmware

    3 2