Hello 👋! I'm Risco, welcome to my portfolio.
Contact Me
I possess strong expertise in HTML5, allowing me to craft clean, semantic, and well-structured markup for building robust web foundations.
I have advanced proficiency in CSS3, enabling me to design responsive, elegant user interfaces and implement modern visual effects across various devices.
I possess solid skills in JavaScript, including DOM manipulation, event handling, and the creation of dynamic and interactive user experiences.
I am well-versed in Bootstrap 5 and use its components and grid system to build mobile-first, responsive websites with clean design structures.
I possess advanced skills in Tailwind CSS, leveraging its utility-first framework to build scalable and fully responsive user interfaces efficiently.
I have strong capabilities in PHP, which I use to develop powerful backend systems, manage server-side logic, and deliver secure, dynamic content.
I am highly proficient in MySQL, enabling me to design efficient databases, write complex queries, and manage structured data with reliability and performance.
I possess in-depth knowledge of Linux, including system administration, scripting, file and permission management, package handling, and command-line automation.
I have expertise in network security concepts, including wireless and wired protocol analysis, traffic inspection, and vulnerability assessment using tools like Wireshark and Aircrack-ng, strictly within authorized lab environments.
I possess hands-on experience in web application security testing, identifying and mitigating vulnerabilities such as XSS, SQL injection, and file inclusion using tools like Burp Suite and OWASP ZAP, all within ethical testing scopes.
I have a deep understanding of social engineering techniques, allowing me to develop user-awareness strategies and enhance system security through realistic training and simulation exercises.
I possess skills in cloud-based security testing, including phishing simulations and 2FA/MFA bypass techniques, which I apply responsibly in ethical red team environments to assess and improve cloud platform defenses.
I have a strong command of Python, including data structures, control flow, functions, and scripting for automation, making it a core tool in both development and security projects.
I have successfully completed the Google Cybersecurity Professional Certificate, a comprehensive program that equipped me with hands-on skills in network security, system hardening, incident response, threat detection, and security operations. This certification reflects my ability to assess vulnerabilities, apply mitigation strategies, and use industry-standard tools such as Wireshark, Linux, and Security Information and Event Management (SIEM) systems to protect digital environments.
I’m an ethical hacker and cybersecurity enthusiast with a strong foundation in web development. My skills in HTML, CSS, JavaScript, PHP, MySQL, Bootstrap, and Tailwind CSS allow me to understand how modern websites are built—and more importantly, how they can be broken.
I’ve earned the Google Cybersecurity Professional Certificate and completed the Complete Ethical Hacking Course Bundle from StationX, covering key areas like network hacking, web application exploitation, social engineering, and cloud-based attacks. This has equipped me with a deep understanding of attack surfaces, vulnerabilities, and defense strategies.
I’ve also completed several practical security-focused courses from TCM Security, including:
These hands-on courses have prepared me to perform real-world penetration tests, develop and simulate phishing attacks, write custom Python scripts, and gather actionable intelligence using OSINT techniques. I’m comfortable using Kali Linux and tools like Nmap, Burp Suite, Metasploit, Nikto, WhatWeb, Gobuster, and Gophish.
I’m currently pursuing a Bachelor of Education (Honours Level 8) at the University of Namibia, which strengthens my communication, documentation, and problem-solving skills—essential for effective security reporting and team collaboration.
I’m seeking opportunities in penetration testing, red teaming, or cybersecurity operations where I can apply my combined skills in web development and ethical hacking to help organizations secure their digital environments.
Got Questions? Fill out the form to contact me directly.