Cybersecurity-Driven IT Professional | Junior Pentester
Hi, I'm Sangsongthong Chantaranothai (Hexterika, Gexter). I blend real-world IT support with hands-on offensive security training.
I run Hexterika Cyberlab — my lab-to-client bridge — where I break and harden web apps, Active Directory, and cloud IAM labs, then turn findings into clear, remediation-first reports.
Based in Georgia (EU time zone), open to remote roles and small, well-scoped client projects.
Cybersecurity-Focused IT Professional
I work across core security and IT domains: offensive security, identity and access management, cloud configuration, and practical troubleshooting. I blend hands-on pentesting practice with real IT experience to produce clear findings and remediation-first recommendations.
My work spans both red and blue team fundamentals — from breaking systems in the lab to understanding how to secure them in real environments.
Based in Georgia (UTC+4), open to remote roles and security-focused IT positions.
What I'm Good At
- Turning lab work into real-world style reports: clear scope, evidence, impact, and remediation — written like actual client deliverables.
- Breaking and fixing: web app issues, Active Directory misconfigurations, cloud IAM mistakes, and real-world troubleshooting patterns from my IT background.
- Explaining risk without fluff: translating technical findings into “what this means” and “what to do next” for non-technical stakeholders.
🥋 I work with a martial-arts mindset and diver-level calm — structured, adaptive, and steady under pressure.
How I Build Skill
- Guided & unguided labs: TryHackMe (Top 3%), PortSwigger Web Security Academy, and other offensive security platforms.
- My own environments: an enterprise-style Active Directory lab and an AWS IAM security lab for testing real-world attack and hardening scenarios.
- Writing & documentation: mock pentest reports and walkthroughs that mirror professional reporting standards.
Technical Focus & Tools
- Core security stack: Linux, Kali Linux, Nmap, Burp Suite, Nessus Essentials, Metasploit, OWASP-style web testing, Active Directory fundamentals, AWS IAM.
- Systems & infrastructure: Windows 10/11, Windows Server, basic AD administration, VirtualBox/VMware, SSH, remote support tools (AnyDesk, TeamViewer).
- Supporting tools: PowerShell, basic Bash scripting, Elastic SIEM/Splunk (fundamentals), Google Workspace, Microsoft 365.
- Optional extras when useful: Salesforce & Zoho CRM, Notion, Moodle, plus creative tools like Canva/Figma for clear visuals in reports or documentation.
Certifications & Progress
- CompTIA Security+ CE (2024-2027)
- (ISC)² Certified in Cybersecurity (CC) (2023-2026)
- TryHackMe: Junior Penetration Tester path — Top 3% globally
- TryHackMe profile: tryhackme.com/p/gexter5thm
Additional certifications are listed on my full certifications page.
Location & Collaboration
- Based in Georgia (UTC+4): aligned with European business hours and flexible overlap with U.S. teams when needed.
- English: TOEIC Writing C1, Listening B2, Speaking B1, Reading B2; former U.S. high school exchange student.
- Languages in progress: beginner Romanian, plus other languages as needed for future collaboration.
- Remote-ready: stable setup for video calls, screen sharing, and secure remote access.
I target roles such as Junior Penetration Tester, Information Security Analyst, IT Security Specialist, Cloud Administrator, and Technical Support Specialist.
🧩 Selected Projects & Labs
These projects demonstrate how I investigate systems, map attack paths, and deliver clear, remediation-first findings — the same workflow I apply in real-world roles.
📄 Pentest Report Templates & Case Studies
-
Mock Penetration Test Report Repository:
A central repo containing my reusable pentest report template and case-study style reports based on different labs.
The template mirrors real client deliverables: scoped testing, methodology, walkthroughs, evidence, and remediation.
Current example: GoldenEye case study (TryHackMe) written as if reporting to a real client stakeholder.
View Repository on GitHub
🛡️ Active Directory Pentest Lab (Hexterika Cyberlab)
-
Active Directory Pentest Lab:
A focused AD environment built to simulate enterprise identity attacks and hardening patterns.
Includes Kerberoasting, Pass-the-Hash, NTLM/LLMNR poisoning, SMB relay, and BloodHound-based privilege mapping.
Each offensive technique is paired with a remediation pattern for realistic training.
View Lab Build
☁️ AWS IAM Security Lab
-
AWS IAM Security Lab:
Cloud lab focused on identity misconfigurations and privilege escalation paths in AWS.
Covers least privilege implementation, risky IAM patterns, cross-account exposure, and escalation through flawed policies.
View Cloud Lab
🌐 PortSwigger Web Security Academy
-
Web Security Walkthroughs:
Documented exploitation and mitigation of OWASP vulnerabilities such as SQLi, XSS, SSRF, deserialization, and auth bypasses.
Each write-up includes reproduction steps and developer-friendly fixes.
View Walkthroughs
🎖 TryHackMe Progress (Top 3%)
-
TryHackMe Achievement:
105+ rooms, 13 badges, focused on privilege escalation, web exploitation, and enumeration.
View Profile | THM Walkthroughs
📝 IT/Cybersecurity OneShots
-
IT-Cybersecurity OneShots:
Small experiments and mini-investigations: network quirks, command-line vs browser behaviors, quick troubleshooting write-ups.
Note: These are side notes, not primary portfolio items.
View Repo
✅ Let's Connect & Next Steps
I'm currently targeting roles across offensive security and security-focused IT — including Junior Pentester, Security Analyst, and Cloud/Identity-focused positions. I also take small, well-scoped client projects through Hexterika Cyberlab.
If you need someone who can analyze attack paths, investigate misconfigurations, break-and-fix cloud/AD labs, and produce clear remediation-first reports — I'm ready.
- 📄 View My Resume
- 🔗 Connect on LinkedIn
- 💬 Email: gexterlife.personal@gmail.com
- 🌐 See My Certifications
Thanks for visiting — let's talk if you're building a team that values offensive thinking and clear, practical security improvements.