Waris Damkham

Offensive Security Engineer & AI Security Engineer

Red Teaming • AI Security • Web/AppSec

OSCP+OSCPCPTSCWESCJCACRTPBSCPeWPTX
PNPTPMPAPSAAASCPACPPT1SEC1CDLGHF
Portrait of Waris Damkham

About Me

I am an Offensive Security Engineer and AI Security Engineer with hands-on experience across enterprise penetration testing and applied AI and security research. I deliver end-to-end assessments across Web, API, Mobile, and Network environments, and contribute to Red Team operations focused on real-world attack scenarios, identity abuse, and security posture improvement. My work also includes security automation, critical vulnerability response support, and AI security readiness for AI-enabled applications. I conduct applied identity and access security work on Microsoft 365 Conditional Access policy enforcement, with tooling selected for Black Hat Asia 2026 (Arsenal). Open to global opportunities in Red Teaming, Identity Security, and AI Security.

LinkedInGitHubResearchGateGoogle ScholarEmailCredlyTryHackMeHackTheBoxCredential.NetMedium

Highlighted Certifications

OffSec Certified Professional+ (OSCP+)
OffSec Certified Professional (OSCP)
Hack The Box Certified Penetration Testing Specialist
Hack The Box Certified Web Exploitation Specialist
HTB Certified Junior Cybersecurity Associate
Certified Red Team Professional
Burp Suite Certified Practitioner
Web Application Penetration Tester eXtreme
Practical Network Penetration Tester
Practical Mobile Pentest Associate
Practical SOC Analyst Associate
API Security Certified Professional
APIsec Certified Practitioner
Jr Penetration Tester (PT1)
Cyber Security 101 (SEC1)
Cloud Digital Leader Certification
GitHub Foundations

Experience

Offensive Security Engineer at Kasikorn Business Technology Group
Offensive Security Engineer
Kasikorn Business Technology Group · Full-time
Nov 2024 - Present
Bangkok, Thailand 🇹🇭 · Hybrid

Key Responsibilities:

  • Delivered 38 penetration tests across annual assessments and major-change projects, and contributed as a core member of advanced Red Team engagements, translating findings into remediation actions.
  • Acted as project owner for 12 major security assessment projects in 2025 - 2026, leading end-to-end execution and reporting.
  • Produced 30+ executive and technical summaries and delivered 24 security briefings (18 Penetration Testing: 15 Thai / 3 English; 6 Red Team), aligning stakeholders on risk impact, priorities, and action plans.
  • Led AI pentesting and AI security workstreams across readiness, research, and automation tooling, using OWASP LLM Top 10 to translate emerging risks into actionable guidance and presentation-ready materials
  • Led PwnDoc-ng implementation, achieving 50% reduction in operational effort and 25% reduction in review workload, and drove reporting standard upgrades through 2025 report redesign and issue write-up rewrites aligned with modern security standards.
  • Built security automation to scale recurring operations, including monthly subsidiary reporting extraction (34.7% manual-effort reduction), email-driven Critical CVE follow-up (≥ 50% time reduction and ≥ 80% mitigation artifact tracking), and BitSight WAS daily scan automation supporting a BitSight rating of 800.

Skills: Penetration testing · Kali Linux · Burp Suite · AI Security · Reporting · Power Automate · Power Apps

Cybersecurity Consultant (Penetration tester) at ALPHASEC
Cybersecurity Consultant (Penetration tester)
ALPHASEC · Full-time
Jun 2024 - Oct 2024 · 5 mos
Bangkok, Thailand 🇹🇭 · Hybrid

Key Responsibilities:

  • Conducted in-depth penetration testing of IT infrastructure, identifying vulnerabilities in operating systems, applications, configurations, and user behavior.
  • Specialized in web, mobile, and software vulnerability assessments following OWASP Top 10 and industry best practices.
  • Delivered detailed security reports with actionable remediation steps to strengthen clients’ overall security posture.
  • Worked cross-functionally with development and infrastructure teams to ensure timely remediation of security risks.
  • Successfully completed 16 security assessment projects during the engagement.

Skills: Penetration testing · Kali Linux · Burp Suite · OWASP · Vulnerability Assessment

Cybersecurity Consultant (Penetration tester) at KPMG · Advisory · Tech-Cyber
Cybersecurity Consultant (Penetration tester)
KPMG · Advisory · Tech-Cyber · Internship
Jan 2024 - Apr 2024 · 4 mos
Bangkok, Thailand 🇹🇭 · Hybrid

Key Responsibilities:

  • Assisted in conducting penetration tests on software, mobile, and web applications using tools such as Kali Linux and Burp Suite.
  • Followed OWASP best practices to identify and document security vulnerabilities and simulate real-world cyberattacks.
  • Performed vulnerability assessments on KPMG’s internal network using Nessus and other scanning tools.
  • Contributed to the development of a secure internal website, incorporating security-by-design principles.
  • Completed 2 penetration testing projects and 1 vulnerability assessment project, improving communication of complex findings to stakeholders.
  • Gained practical expertise in offensive security while actively pursuing continuous learning in a dynamic threat landscape.

Skills: Penetration testing · Kali Linux · Burp Suite · OWASP · Vulnerability Assessment

Detecting Vulnerable OAuth 2.0 Implementations in Android Applications at Ritsumeikan University
Detecting Vulnerable OAuth 2.0 Implementations in Android Applications
Ritsumeikan University · Internship
May 2023 - July 2023 · 3 mos
Shiga, Japan 🇯🇵 · On-site

Key Responsibilities:

  • Conducted research on OAuth 2.0 implementations in Android applications and browser extensions, focusing on vulnerabilities related to Cross-Site Request Forgery (CSRF).
  • Evaluated critical security parameters such as the state value and authorization code to determine resilience against CSRF attacks.
  • Developed a custom Android application and analyzed real-world apps and extensions to assess OAuth integration practices.
  • Identified insecure implementations that exposed users to potential token hijacking and session fixation risks
  • Contributed to the development of a benchmark for future security audits of Android apps and browser extensions using OAuth 2.0, promoting safer authentication design.
  • Presented research findings at the Workshop on Cyber Forensics, Security, and E-discovery, part of the 23rd IEEE International Conference on Software Quality, Reliability, and Security (QRS 2023).

Skills: Android Development · OAuth2.0 · Application Security · Security · Cybersecurity · Java

Automated COVID-19 Screening Framework Using Deep CNN With Chest X-Ray Medical Images at National Central University
Automated COVID-19 Screening Framework Using Deep CNN With Chest X-Ray Medical Images
National Central University · Internship
Jun 2022 - Jul 2022 · 2 mos
Taoyuan City, Taiwan 🇹🇼 · Remote

Key Responsibilities:

  • Contributed to a research project focused on automated COVID-19 diagnosis using deep learning and chest X-ray images.
  • Developed and evaluated a convolutional neural network (CNN) model enhanced by transfer learning for accurate COVID-19 screening.
  • Utilized Grad-CAM visualizations to interpret model predictions and enhance explainability for medical practitioners.
  • Conducted experiments on publicly available datasets to assess model performance in terms of accuracy, precision, recall, and F-measure.
  • Demonstrated expertise in artificial intelligence, deep learning, and medical image analysis applied to real-world health challenges.
  • Published research findings at the 2022 6th International Conference on Information Technology (InCIT).

Skills: Public Speaking · Jupyter · Convolutional Neural Networks (CNN) · Deep Learning · Artificial Intelligence (AI) · Communication · Python

Security Vulnerabilities (CVEs)

Critical
CVE-2026-1306
midi-Synth

The midi-Synth plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type and file extension validation in the 'export' AJAX action in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible granted the attacker can obtain a valid nonce. The nonce is exposed in frontend JavaScript making it trivially accessible to unauthenticated attackers.

Feb 13, 2026
High
CVE-2026-1104
FastDup

The FastDup – Fastest WordPress Migration & Duplicator plugin for WordPress is vulnerable to unauthorized backup creation and download due to a missing capability check on REST API endpoints in all versions up to, and including, 2.7.1. This makes it possible for authenticated attackers, with Contributor-level access and above, to create and download full-site backup archives containing the entire WordPress installation, including database exports and configuration files.

Feb 11, 2026
MEDIUM
CVE-2026-1231
Beaver Builder Page Builder

The Beaver Builder Page Builder – Drag and Drop Website Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `js` Global Settings parameter in all versions up to, and including, 2.10.0.5 due to missing capability checks on save_global_settings() function and insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Custom-level access and above who have been granted beaver builder access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Feb 10, 2026

Speaker & Presentations

ArsenalAccepted
Oblivion Token: M365 Conditional Access Policy Bypass OST (Offensive Tooling)
Black Hat Asia Arsenal 2026

Oblivion Token is a focused offensive-research utility that makes Microsoft 365 Conditional Access Policy (CAP) bypass testing practical, repeatable, and scriptable. Designed for red-teamers and security researchers, it systematizes token-centric workflows and exercises policy edge cases to expose where device, network, or app-context assumptions fail including realistic test paths against Microsoft first-party (built-in) applications.

Marina Bay Sands, SingaporeApril 2026
WebinarPresented
AI Security Unmasked: The Hidden Danger Behind Your AI Tools
KBTG Knowledge Sharing 2025

TBA

MS TeamsSep 2025
MeetupPresented
AI Security Research: The Rise of AI Threat (ยุคใหม่ของภัยคุกคามอัตโนมัติ)
TBCert Monthly Meeting 2025

TBA

Bangkok, ThailandMay 2025

Academic Publications

Research papers presented at international IEEE conferences

TENCON 20242025
Practical Mobile Based Services for Identification of Chicken Diseases From Fecal Images

IEEE Region 10 Conference 2024

Poultry farming is crucial to the food chain, and chicken health directly impacts product quality and safety. Diagnosing poultry diseases using polymerase chain reaction is costly, particularly for small farms. To address this, we developed a mobile-based service for farmers, enabling the identification of common chicken diseases from fecal images via a Line account. Our system achieved 86.49% segmentation precision and 95.93% classification accuracy on a large dataset, offering a practical and accessible tool for local farmers.

March 5, 2025
QRS 20232023
Detecting Vulnerable OAuth 2.0 Implementations in Android Applications

23rd IEEE International Conference on Software Quality, Reliability, and Security

OAuth 2.0, commonly used for authorization, can be susceptible to CSRF attacks in Android applications. To address this, we developed an Android app to assess other apps' use of the OAuth 2.0 state parameter—a key defense against CSRF. Our analysis, conducted on both Chrome and the default browser, evaluates whether Android apps using OAuth 2.0 are adequately protected against CSRF attacks. Our research aims to protect users by highlighting apps with potentially vulnerable OAuth 2.0 implementations.

February 19, 2024
InCIT 20222022
Automated COVID-19 Screening Framework Using Deep CNN With Chest X-Ray Medical Images

6th International Conference on Information Technology

An automated COVID-19 screening framework using chest X-ray images is proposed in this study. It leverages artificial intelligence techniques and transfer learning for accurate diagnosis. The framework extracts features using transfer learning and applies modified deep neural networks. Grad-CAM visualization supports the predicted diagnosis. Experimental results demonstrate superior performance compared to other deep learning techniques. This framework has the potential to aid in early COVID-19 diagnosis and alleviate the burden on radiologists.

March 21, 2023

Projects

Skills & Tools

Programming Languages
Web Development
Backend, Frameworks & Testing
Data Management & Search Engines
Cloud & Container Platforms
DevOps & CI/CD Tools
Penetration Testing & Vulnerability Assessment
Machine & Deep Learning
Productivity & Collaboration

Certifications

AI & LLM Exploitation Challenges (All 10 Labs Completed) certificate
AI & LLM Exploitation Challenges (All 10 Labs Completed)
8kSec
Jan/Feb 2026
View Credential
Cyber Security 101 (SEC1) certificate
Cyber Security 101 (SEC1)
TryHackMe
Feb 2026 - Feb 2029
View Credential
Certified Web App Penetration Testing Apprentice (KWAPTA) certificate
Certified Web App Penetration Testing Apprentice (KWAPTA)
Knight Squad Academy
Jan 2026
View Credential
Certified C++ Practitioner Certification (CCPC) certificate
Certified C++ Practitioner Certification (CCPC)
Red Team Leaders
Dec 2025
View Credential

Education

Bachelor of Science in Information and Communication Technology
Mahidol University, Thailand 🇹🇭
International Program
2020 - 2024

Activities and societies:

ICT Internship Poster Exhibition 2023 at ICT Mahidol
Sep 2023
Joined the exhibition showcasing B.Sc. ICT International Program student internships. Proudly shared my experience from Ritsumeikan University among esteemed peers. An enriching platform for insights and networking.

Bangkok Christian College
Smart Computer · GPAX 3.48
2008 - 2020

Activities and societies:

Leader of Academic Computer & Careers of Bcc Showcase 2018
I served as the president of the Computer & Careers group during our school's academic day, 'The New Frontier' for the BCC Showcase. Our event featured a cooking competition named 'BCC FOOD FEST' and a 'TECHZONE' highlighting modern innovations, such as a futuristic house concept.

Self-Learning on HackTheBox
Online Platform for Cybersecurity Training

Activities and societies:

Pro Hacker
HackTheBox Profile

Self-Learning on TryHackMe
Online Platform for Cybersecurity Training

Activities and societies:

waris.dam [0xA][WIZARD]
TryHackMe Profile

Competitions

Blog

My Resume

resume.pdf — waaris_m@portfolio

PDF preview loads on demand to keep the homepage fast.

contact.sh — bash
waaris_m@portfolio:~$ cat contact.txt
# CONTACT INFORMATION
PHONE:+66 63 954 4447
LOCATION:Bangkok, Thailand 🇹🇭
waaris_m@portfolio:~$_