Conducted security assessments by simulating real-world attacks to identify vulnerabilities, exploit weaknesses, and recommend remediation strategies. Focused on web applications, networks, and system configurations to strengthen overall security posture.