Bruno Naves

DevOps Engineer

Brasília, Federal District, Brazil5 yrs 5 mos experience

Key Highlights

  • Over 6 years of experience in offensive security.
  • Expert in Red Team operations and adversary emulation.
  • Advanced certifications in penetration testing and security.
Stackforce AI infers this person is a Cybersecurity Specialist with a focus on Offensive Security and Red Teaming.

Contact

Skills

Core Skills

Red TeamingAdversary EmulationPenetration TestingSecurity AssessmentsDetection ValidationSecurity OperationsIncident Response

Other Skills

Adversary SimulationOffensive SecuritySecurity TestingWeb Application SecurityMobile Security TestingAPI SecurityCloud SecurityDetection EngineeringPhishing AnalysisNetwork SecurityThreat DetectionSOC DevelopmentSecure Code ReviewSwiftObjective-C

About

I’m an Offensive Security Engineer and Red Team specialist with over 6 years of experience across penetration testing, adversary emulation, and security assessments for web, mobile, API, infrastructure, and multicloud environments. My work combines deep offensive expertise with a strong understanding of how to evaluate detection, response, and resilience against real-world attack scenarios. Throughout my career, I have worked across both offensive and defensive security domains, which allows me to approach engagements with a broader strategic perspective. I’ve led and executed activities involving adversary simulation, phishing operations, cloud security assessments in AWS and Azure, macOS-focused security testing, and validation of security controls in enterprise environments. Currently, I focus on Red Team operations in multicloud environments, with emphasis on macOS security, phishing campaigns, and realistic attacker emulation. Outside of work, I dedicate time to iOS and macOS security research, reverse engineering, and malware development for macOS, supported by advanced certifications including: - OffSec Certified Expert 3 (OSCE3) - OffSec Exploit Developer (OSED) - OffSec Experienced Penetration Tester (OSEP) - OffSec Web Expert (OSWE) - OffSec Certified Professional (OSCP) - OffSec Wireless Professional (OSWP) - Certified Red Team Professional (CRTP) - iOS Application Security Engineer (iASE) - Red Team Operator (CRTO) CTF's: 3º Place | OEA Cyber Challenge 6º Place | INTERNATIONAL CYBERSECURITY CHAMPIONSHIP & CONFERENCE (IC3) 3º Place | Cyber 9/12 8º Place | OEA Cyber Challenge 6º Place | International Cybersecurity Challenge (ICC) 4º Place | OEA Cyber Challenge

Experience

5 yrs 5 mos
Total Experience
1 yr 2 mos
Average Tenure
--
Current Experience

Banco bv

Red Team Operator

Apr 2025Dec 2025 · 8 mos · Remote

  • At Banco BV, I worked as a Red Team Operator responsible for conducting adversary simulation exercises aimed at assessing the effectiveness of the bank’s security controls and monitoring capabilities. My role focused on replicating realistic attacker behavior to identify weaknesses in internal systems, enterprise infrastructure, and cloud environments.
  • I executed offensive security activities that simulated different phases of the attack lifecycle, including gaining initial access, escalating privileges, moving laterally across systems, and performing post-exploitation actions. These controlled simulations helped evaluate how well defensive technologies and security teams were able to detect and respond to potential threats.
  • Throughout these engagements, I collaborated closely with defensive teams to share findings and improve security operations. The insights generated from red team activities were used to enhance detection mechanisms, strengthen incident response procedures, and improve the overall resilience of the organization’s security program.
  • Technologies & Solutions:
  • Adversary Simulation: Execution of realistic attack scenarios against enterprise infrastructure
  • Offensive Security: Privilege escalation, lateral movement, and post-exploitation activities
  • Detection Validation: Assessment of monitoring and alerting capabilities
  • Security Testing: Identification of weaknesses in security controls through controlled attack simulations
  • Results:
  • Revealed security gaps by simulating real-world attack techniques against corporate environments
  • Contributed to stronger detection capabilities by validating existing monitoring systems
  • Supported improvements in incident response by sharing detailed findings with defensive teams
  • Helped enhance the overall security posture of the organization through continuous adversary simulation exercises
Adversary SimulationOffensive SecurityDetection ValidationSecurity TestingRed TeamingAdversary Emulation

Sek security ecosystem knowledge

Offensive Security Analyst

Sep 2023Apr 2025 · 1 yr 7 mos · Remote

  • At SEK Security Ecosystem Knowledge, I worked as a Penetration Tester performing comprehensive security assessments across web applications, mobile platforms, APIs, and cloud environments. My responsibilities included identifying security vulnerabilities, validating exploitation paths, and simulating realistic attack scenarios to evaluate the resilience of systems and applications.
  • In addition to penetration testing activities, I also contributed to the development and maintenance of infrastructure used to support advanced security testing and adversary simulation exercises. This included preparing environments for offensive security tooling, payload testing, and controlled attack simulations. I collaborated with security and development teams to ensure vulnerabilities were clearly understood and effectively remediated.
  • Technologies & Solutions:
  • Web Application Security: Testing for vulnerabilities such as SQL Injection, XSS, authentication flaws, and access control issues
  • Mobile Security Testing: Security assessments for Android and iOS applications, including insecure storage, reverse engineering, and API misuse
  • API Security: Testing RESTful APIs for authorization flaws, input validation issues, and business logic vulnerabilities
  • Cloud Security: Security assessments of cloud infrastructures and services
  • Security Testing Infrastructure: Development of environments to support advanced offensive security testing
  • Results:
  • Identified critical vulnerabilities across web, mobile, API, and cloud environments
  • Improved application and infrastructure security through detailed technical reports and remediation guidance
  • Supported secure development practices by working closely with development and infrastructure teams
  • Built and maintained infrastructure used to support advanced security testing activities
Web Application SecurityMobile Security TestingAPI SecurityCloud SecurityPenetration TestingSecurity Assessments

Ish tecnologia

Penetration Tester

Jun 2022Dec 2023 · 1 yr 6 mos · Remote

  • As a Penetration Tester at ISH Tecnologia, I was responsible for conducting comprehensive security assessments across web applications, mobile platforms, APIs, and cloud environments. My work focused on identifying vulnerabilities, simulating real-world attack scenarios, and providing actionable recommendations to improve the overall security posture of client infrastructures and applications.
  • I performed both black-box and gray-box penetration tests following industry best practices, analyzing application logic, authentication mechanisms, and cloud configurations to uncover security weaknesses. Additionally, I worked closely with development and infrastructure teams to ensure vulnerabilities were properly understood and remediated in accordance with secure development practices.
  • Technologies & Solutions:
  • Web Application Security: Identification of vulnerabilities such as SQL Injection, XSS, authentication bypass, and access control issues
  • Mobile Security Testing: Security assessments for Android and iOS applications, focusing on insecure data storage, API misuse, and authentication flaws
  • API Security: Testing RESTful APIs for authorization flaws, input validation issues, and logic vulnerabilities
  • Cloud Security: Security assessments of cloud-based infrastructures and services
  • Security Testing Tools: Burp Suite, Nmap, and other offensive security tools and frameworks
  • Results:
  • Identified critical security vulnerabilities across web, mobile, API, and cloud environments
  • Improved client security posture through detailed vulnerability reports and remediation guidance
  • Simulated real-world attack scenarios to validate security controls and application resilience
  • Supported development teams in implementing secure coding practices and strengthening application security
Web Application SecurityMobile Security TestingAPI SecurityCloud SecurityPenetration TestingSecurity Assessments

Kryptus sa

Purple Team Analyst

Sep 2021Sep 2022 · 1 yr · Remote

  • I was responsible for bridging offensive and defensive security operations by simulating real-world adversary techniques and validating detection capabilities across enterprise environments. My work focused on adversary emulation, detection engineering, and continuous improvement of defensive controls based on threat intelligence and the MITRE ATT&CK framework.
  • I conducted controlled attack simulations using red team tools to replicate real threat actor behavior, while collaborating closely with blue team analysts to improve detection, response procedures, and security monitoring effectiveness. In addition, I performed phishing analysis and investigation to identify social engineering campaigns and strengthen organizational awareness and response capabilities.
  • Technologies & Solutions:
  • Adversary Emulation: MITRE Caldera for automated attack simulation based on the MITRE ATT&CK framework
  • Red Team Tooling: Cobalt Strike and Impacket for post-exploitation activities and lateral movement simulation
  • Detection Engineering: Validation and improvement of detection rules and security monitoring capabilities
  • Phishing Analysis: Investigation and analysis of phishing campaigns and social engineering attempts
  • Results:
  • Improved detection and response capabilities by validating defensive controls through adversary emulation exercises
  • Strengthened blue team visibility by mapping attack simulations to MITRE ATT&CK techniques
  • Enhanced incident investigation processes through detailed phishing analysis and threat validation
  • Fostered collaboration between red and blue teams to continuously improve the organization’s security posture
Adversary EmulationDetection EngineeringPhishing AnalysisRed TeamingDetection Validation

Intelliway

Cyber Security Analyst

Jul 2021Sep 2021 · 2 mos · Remote

  • As a Penetration Tester at Intelliway, I was responsible for conducting security assessments across corporate infrastructures, web applications, and internal networks to identify vulnerabilities and strengthen the organization’s security posture. My work involved simulating real-world attack scenarios to evaluate the effectiveness of existing security controls and provide actionable remediation guidance.
  • I performed both internal and external penetration tests, leveraging industry-standard tools and methodologies to uncover weaknesses in authentication mechanisms, network configurations, and application logic. Additionally, I collaborated with development and infrastructure teams to ensure vulnerabilities were properly understood and remediated.
  • Technologies & Solutions:
  • Offensive Security: Network and Web Application Penetration Testing
  • Vulnerability Assessment: Identification, exploitation, and risk validation of security weaknesses
  • Security Testing Tools: Nmap, Burp Suite, Metasploit, and other offensive security frameworks
  • Reporting & Remediation: Technical reporting and guidance for secure remediation practices
  • Results:
  • Identified critical vulnerabilities across web applications and corporate infrastructure environments
  • Improved organizational security posture by delivering detailed remediation recommendations
  • Simulated real-world attack scenarios to validate defensive controls and incident response readiness
  • Supported secure development practices by collaborating with technical teams during vulnerability remediation
Network SecurityThreat DetectionSOC DevelopmentSecurity OperationsIncident Response

Grupo ntsec

Security Analyst

May 2020Jul 2021 · 1 yr 2 mos · Hybrid

  • I was responsible for managing and operating enterprise security infrastructure based on Check Point technologies while supporting the design and implementation of a Security Operations Center (SOC). My role involved monitoring network activity, improving defensive controls, and helping build processes and detection capabilities to enhance the organization's security posture.
  • I initially focused on firewall management and network protection using Check Point solutions, including rule optimization, threat prevention tuning, and incident investigation. As the security program evolved, I contributed to the development and structuring of the SOC, supporting the implementation of monitoring processes, alert triage workflows, and security event analysis.
  • Technologies & Solutions:
  • Network Security: Check Point Firewall (policy management, rule optimization, threat prevention)
  • Threat Detection: Security event monitoring and incident analysis
  • SOC Development: Design of monitoring workflows, alert triage processes, and incident response procedures
  • Vulnerability Management: Security assessments and remediation tracking
  • Results:
  • Improved network security posture by optimizing Check Point firewall policies and threat prevention controls
  • Contributed to the creation and operational structuring of the company’s Security Operations Center (SOC)
  • Enhanced incident detection and response capabilities through improved monitoring and analysis workflows
  • Strengthened security governance by supporting vulnerability remediation and continuous monitoring practices

Education

Faculdade Facint

Pós Graduação — Ethical Hacking e CyberSecurity

Jan 2020Jan 2020

Universidade Paulista

Bacharelado — Ciência da Computação

Jan 2016Jan 2019

Stackforce found 100+ more professionals with Red Teaming & Adversary Emulation

Explore similar profiles based on matching skills and experience