Mishack Victor Chinaza

Hi I'm,

Penetration Tester

Application Security Specialist

Cloud Security Tester

Hire Me
About Image
About Me

Offensive Security • Application • Cloud • Network

I am a Web, Network, and Cloud Penetration Tester focused on identifying real-world security risks before attackers exploit them. I approach security from an adversarial mindset—combining manual testing, industry frameworks, and practical exploitation techniques to uncover vulnerabilities across applications, APIs, networks, and cloud environments.

My work emphasizes clarity and impact: translating technical findings into actionable remediation guidance aligned with OWASP Top 10, PTES, and MITRE ATT&CK. I collaborate closely with stakeholders to improve security posture, reduce attack surface, and strengthen defensive controls.

Core Skills And Expertise

Tools, Techniques, and Methodologies

My skill set spans offensive security testing, cloud security analysis, and professional reporting. I apply structured methodologies and hands-on techniques to deliver meaningful, risk-focused security assessments.

  • Web Application Penetration Testing 90%
  • API Security Testing 88%
  • Cloud Security (AWS) 85%
  • Network Penetration Testing 82%
  • Vulnerability Assessment & Reporting 88%
  • OWASP Top 10 90%
  • OWASP API Security Top 10 85%
  • MITRE ATT&CK 80%
  • PTES Methodology 82%
  • Burp Suite 88%
  • Nmap 85%
  • Metasploit 80%
  • Postman 85%
  • AWS CLI 80%
  • Linux (Kali Linux) 88%
  • Bash Scripting 75%
Image
Security Services

Focused, Methodical, and Actionable Assessments

Experience

Hands-on Security Testing And Simulated Engagements

Education
Diploma in Cybersecurity (Ethical Hacking)
Jan 20, 2025 - Aug 20, 2025

Completed hands-on cybersecurity and ethical hacking training focused on penetration testing, vulnerability assessment, and web, network, and cloud security fundamentals, using industry-standard tools and methodologies.

line image
Job
Web, Network & Cloud Penetration Tester [Self-Employed / Independent Projects]
Mar 1, 2025 - Present

Hands-on penetration testing experience across web, network, API, and cloud environments, including AWS security assessments, vulnerability analysis, reporting, and incident response simulations.

Cybersecurity Job Simulation Intern [Mastercard (Forage)]
Jun 1, 2025 - Jun 30, 2025

Completed a virtual cybersecurity job simulation covering penetration testing, security frameworks, reporting, lab configuration, and vulnerability management workflows.

Cybersecurity Trainee (Ethical Hacking) [Security Labs And Practical Training]
Jan 20, 2025 - Aug 20, 2025

Structured cybersecurity and ethical hacking training with hands-on experience in reconnaissance, exploitation, and core Linux, networking, and security fundamentals.

Portfolio

Practical Security Testing and Research Projects

  • All
  • Web Application Security
  • API Security Testing
  • Cloud Security (AWS)
  • Network Penetration Testing
  • Vulnerability Research
Professional Feedback

Insights from Training, Simulations, and Collaborations

Security Team MentorSenior Cybersecurity Professional
Senior Cybersecurity Professional

HarkarVOG demonstrates a strong understanding of penetration testing methodologies and consistently approaches security assessments with an attacker’s mindset. His ability to clearly document findings and provide practical remediation guidance shows maturity beyond his experience level.

Forage Program Reviewer
Cybersecurity Program Evaluator

During the cybersecurity job simulation, HarkarVOG effectively applied OWASP Top 10, PTES, and MITRE ATT&CK frameworks. His reports were well-structured, technically accurate, and easy for both technical and non-technical audiences to understand.

Security Lab Instructor
Ethical Hacking Trainer

HarkarVOG shows strong hands-on skills in web, network, and cloud security testing. He is detail-oriented, curious, and consistently seeks to understand real-world attack techniques rather than relying solely on automated tools.

Security Research And Insights

Vulnerability Research, Techniques, and Analysis

Blog Image

Why Web Application Penetration Testing Still...

Web applications remain one of the most targeted attack surfaces for modern organizations. Despite a...

Blog Image

Understanding IDOR and Broken Access Control ...

Broken Access Control remains one of the most critical and commonly exploited vulnerabilities in mod...

Blog Image

Common AWS Misconfigurations Attackers Active...

Cloud environments offer scalability and flexibility, but misconfigurations remain one of the leadin...

Get in Touch

Discuss Security Needs, Assessments, or Collaboration