
Steve Jesso
Cybersecurity | Red Team

01 PROFESSIONAL
CYBERSECURITY SKILLS & KNOWLEDGE
Hands on and Technical Experience with the following programs and tools:
​
I work extensively with a wide range of cybersecurity and OSINT tools, including offensive platforms like Cobalt Strike, Sliver C2, Havoc, and Mythic, alongside credential access and post-exploitation tools such as Metasploit2, Mimikatz, Rubeus, John the Ripper, Hashcat, and Hydra.
My reconnaissance and scanning knowledge includes Nmap, Masscan, Nikto, Shodan, Burp Suite, and Wireshark, often paired with automation via Python and Bash. I’ve worked with and in some cases modified existing tools such as Ingram, BBot, RTSPBruter, and Seeker for RTSP streaming/IP camera exploitation, and frequently integrate Shodan CLI, and LDAPSearch into OSINT workflows.
Additional utilities include Aircrack-ng, BloodHound/SharpHound, Ligolo-ng, GSocket, and Curl/Wget, as well as environment managers like Pyenv and Virtualenv.
​
​
Extracurricular Experience & Capture-the-Flag / Cybersecurity Labs
​
Hack The Box (HTB) Labs
Ongoing – Self-Directed
-
HTB Pro Lab - Dante – In-Progress (25% complete)
-
Starting Point complete (25 machines)
​
MetaCTF
Monthly – Self-Directed
Multiple participation's, averaging 4/5 submitted flags within 2 hour competition
​
​
S
An aspiring cyber-security professional, focused on red teaming, penetration testing, covert enumeration and reconnaissance, in-depth open source intelligence (OSINT) research, active directory traversal, and combining tactical precision with operational stealth and commitment to OPSEC to simulate, investigate, and disrupt adversarial infrastructure.
​
Highly motivated and independent, I utilize various industry tools and platforms to achieve my goals. My passion for this work drives me to constantly improve and stay up-to-date with the latest developments in the world of penetration testing, malware and vulnerability management, ethical hacking, zero-day exploitation and understanding and navigating current world events that shape the fluid and dynamic nature of the attack and cyberspace.

02 CERTIFICATIONS
-
2025 - Red Team Operator 1 Certificate - Rogue Ops
-
2025 - CompTia Security+ Certified
-
2024 - Red Team Operator Certificate - TryHackMe
-
2024 - Jr. Penetration Tester Certificate - TryHackme
-
2022-2024 - Network Security Associate Degree - University of OttawaCisco Related - Cyber Essentials, Switching, Routing & Wireless, Python Coding Essentials, Linux OS Essentials and IT Essentials
Education, certificates, learning and achievements


04 Experience
2024 - Present
Certification & Development
Educational upgrading and training on various certificates and industry courses ranging from: Rogue Ops Redteam1, to TryHackMe's Red Team Operator and Junior Penetration Tester Certificates.
2022-2024
University of Ottawa
Network Security Associate
Associates degree focusing upon network security fundamentals, IP connectivity and services, IT essentials, Linux training, defensive and offensive fundamentals, OPSec, beginner Python, and familiarity with Cisco architecture.
2018-2022
District of North Saanich
Planning & Development Administrator
Board of Variance Secretariat. Established and maintained a comprehensive database tracking variance approval rates, hearing outcomes, and trends in requests over time. Designed and implemented standardized operating protocols, enhancing operational efficiency and streamlining project completion.
2013-2017
Athabasca University
Bachelor Degree of General Science
Focii on Chemistry and Computer Sciences
2003-2012
Canadian Armed Forces - Army
Resource Management & Logistics
Operating with a Top Secret clearance level, successfully conducted corporate and military logistics for multi-million dollar assets, regimental financial management, personnel administration, operational theatre level logistical & administration management requiring extreme levels of detail and organization.

CONTACT
Please feel free to reach out and contact me through this form. I will endeavour to respond to your inquiry as soon as possible.