Skip to content
View joseluisinigo's full-sized avatar
🏠
Working from home
🏠
Working from home

Block or report joseluisinigo

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
joseluisinigo/README.md

Who-Am-I

Cybersecurity & DevSecOps Engineer

🔹 About Me

With over 15 years of experience in cybersecurity and DevSecOps, I specialize in:

  • Penetration testing for web applications, APIs, mobile platforms, and cloud security.
  • Secure software development, following OWASP Top 10 and best practices.
  • CI/CD security, automating security testing with GitLab CI/CD.
  • Network & infrastructure security, securing Linux systems, VPNs, and cloud environments.
  • Reverse engineering & security research, analyzing software for vulnerabilities.

I am passionate about improving security in DevOps pipelines, developing tools, and contributing to open-source security projects.


🔍 Areas of Expertise

  • Penetration Testing – Web, API, Mobile, Cloud & Network Security
  • DevSecOps – GitLab CI/CD, Secure Automation, Compliance
  • Cloud Security – Securing cloud infrastructures & enforcing best practices
  • Red Teaming & Ethical Hacking – Adversary simulation & threat modeling
  • Reverse Engineering & Malware Analysis – Binary analysis & vulnerability research
  • Secure Software Development – OWASP, Secure SDLC, API Security
  • Network Security – Hardening Linux, VPN Security, Firewalls
  • Security Research & Open-Source Contributions

📂 Notable Projects

🛠 Security & DevOps Automation Tools


🎓 Certifications

  • Offensive Security Certified Professional (OSCP)
  • eLearnSecurity Certified Penetration Tester eXtreme (eCPTX)
  • eLearnSecurity Web Application Penetration Tester eXtreme (eWPTX)
  • Offensive Security Wireless Professional (OSWP)
  • Certified Red Team Operator (CRTO)
  • Certified Mobile Pentester (CMPEN)
  • Mobile Application Penetration Tester (eMAPT)
  • Certified API Security Analyst (CASA)

🚀 Tech Stack & Tools

  • Security Tools: BurpSuite, Nessus, OpenVAS, Metasploit, Mimikatz, SQLmap, Zaproxy
  • DevSecOps & CI/CD: GitLab CI/CD, Azure DevOps, Docker, Terraform, Ansible
  • Languages & Scripting: Python, Bash, PowerShell, JavaScript
  • Cloud & Infrastructure: Linux Hardening, Secure Cloud Architectures, VPN Security

📫 Contact & Links

Achievements:-

Awards and Recognition

Pinned Loading

  1. linux-exploit-suggester linux-exploit-suggester Public

    Forked from The-Z-Labs/linux-exploit-suggester

    Linux privilege escalation auditing tool

    Shell

  2. 0x4xel.github.io 0x4xel.github.io Public

    Forked from 0x4xel/0x4xel.github.io

    Personal github pages

    CSS 1

  3. createdictionarysqlinjection createdictionarysqlinjection Public

    Create a sql injection dictionary for use in burpsuite intruder.

    Python 3 1

  4. tools-oscp tools-oscp Public

    Tools for oscp know how cheat sheet

  5. burpsuite-laboratories burpsuite-laboratories Public

    my burpusite laboratories

    Java 4

  6. extractipandports-nmap extractipandports-nmap Public

    if you have many ips with ports in nmap format and you want only ip ports , you can use this script

    Python