Waris Damkham

Offensive Security Engineer & AI Security Engineer

Red Teaming • AI Security • Web/AppSec

OSCP+OSCPCPTSCWESCJCACRTPBSCPeWPTX
PNPTPMPAPSAAASCPACPPT1SEC1CDLGHF
Portrait of Waris Damkham

About Me

I am an Offensive Security Engineer and AI Security Engineer with hands-on experience across enterprise penetration testing and applied AI and security research. I deliver end-to-end assessments across Web, API, Mobile, and Network environments, and contribute to Red Team operations focused on real-world attack scenarios, identity abuse, and security posture improvement. My work also includes security automation, critical vulnerability response support, and AI security readiness for AI-enabled applications. I conduct applied identity and access security work on Microsoft 365 Conditional Access policy enforcement, with tooling selected for Black Hat Asia 2026 (Arsenal). Open to global opportunities in Red Teaming, Identity Security, and AI Security.

LinkedInGitHubResearchGateGoogle ScholarEmailCredlyTryHackMeHackTheBoxCredential.NetMedium

Highlighted Certifications

OffSec Certified Professional+ (OSCP+)
OffSec Certified Professional (OSCP)
Hack The Box Certified Penetration Testing Specialist
Hack The Box Certified Web Exploitation Specialist
HTB Certified Junior Cybersecurity Associate
Certified Red Team Professional
Burp Suite Certified Practitioner
Web Application Penetration Tester eXtreme
Practical Network Penetration Tester
Practical Mobile Pentest Associate
Practical SOC Analyst Associate
API Security Certified Professional
APIsec Certified Practitioner
Jr Penetration Tester (PT1)
Cyber Security 101 (SEC1)
Cloud Digital Leader Certification
GitHub Foundations

Experience

Offensive Security Engineer at Kasikorn Business Technology Group
Offensive Security Engineer
Kasikorn Business Technology Group · Full-time
Nov 2024 - Present
Bangkok, Thailand 🇹🇭 · Hybrid

Key Responsibilities:

  • Delivered 38 penetration tests across annual assessments and major-change projects, and contributed as a core member of advanced Red Team engagements, translating findings into remediation actions.
  • Acted as project owner for 12 major security assessment projects in 2025 - 2026, leading end-to-end execution and reporting.
  • Produced 30+ executive and technical summaries and delivered 24 security briefings (18 Penetration Testing: 15 Thai / 3 English; 6 Red Team), aligning stakeholders on risk impact, priorities, and action plans.
  • Led AI pentesting and AI security workstreams across readiness, research, and automation tooling, using OWASP LLM Top 10 to translate emerging risks into actionable guidance and presentation-ready materials
  • Led PwnDoc-ng implementation, achieving 50% reduction in operational effort and 25% reduction in review workload, and drove reporting standard upgrades through 2025 report redesign and issue write-up rewrites aligned with modern security standards.
  • Built security automation to scale recurring operations, including monthly subsidiary reporting extraction (34.7% manual-effort reduction), email-driven Critical CVE follow-up (≥ 50% time reduction and ≥ 80% mitigation artifact tracking), and BitSight WAS daily scan automation supporting a BitSight rating of 800.

Skills: Penetration testing · Kali Linux · Burp Suite · AI Security · Reporting · Power Automate · Power Apps

Cybersecurity Consultant (Penetration tester) at ALPHASEC
Cybersecurity Consultant (Penetration tester)
ALPHASEC · Full-time
Jun 2024 - Oct 2024 · 5 mos
Bangkok, Thailand 🇹🇭 · Hybrid

Key Responsibilities:

  • Conducted in-depth penetration testing of IT infrastructure, identifying vulnerabilities in operating systems, applications, configurations, and user behavior.
  • Specialized in web, mobile, and software vulnerability assessments following OWASP Top 10 and industry best practices.
  • Delivered detailed security reports with actionable remediation steps to strengthen clients’ overall security posture.
  • Worked cross-functionally with development and infrastructure teams to ensure timely remediation of security risks.
  • Successfully completed 16 security assessment projects during the engagement.

Skills: Penetration testing · Kali Linux · Burp Suite · OWASP · Vulnerability Assessment

Cybersecurity Consultant (Penetration tester) at KPMG · Advisory · Tech-Cyber
Cybersecurity Consultant (Penetration tester)
KPMG · Advisory · Tech-Cyber · Internship
Jan 2024 - Apr 2024 · 4 mos
Bangkok, Thailand 🇹🇭 · Hybrid

Key Responsibilities:

  • Assisted in conducting penetration tests on software, mobile, and web applications using tools such as Kali Linux and Burp Suite.
  • Followed OWASP best practices to identify and document security vulnerabilities and simulate real-world cyberattacks.
  • Performed vulnerability assessments on KPMG’s internal network using Nessus and other scanning tools.
  • Contributed to the development of a secure internal website, incorporating security-by-design principles.
  • Completed 2 penetration testing projects and 1 vulnerability assessment project, improving communication of complex findings to stakeholders.
  • Gained practical expertise in offensive security while actively pursuing continuous learning in a dynamic threat landscape.

Skills: Penetration testing · Kali Linux · Burp Suite · OWASP · Vulnerability Assessment

Detecting Vulnerable OAuth 2.0 Implementations in Android Applications at Ritsumeikan University
Detecting Vulnerable OAuth 2.0 Implementations in Android Applications
Ritsumeikan University · Internship
May 2023 - July 2023 · 3 mos
Shiga, Japan 🇯🇵 · On-site

Key Responsibilities:

  • Conducted research on OAuth 2.0 implementations in Android applications and browser extensions, focusing on vulnerabilities related to Cross-Site Request Forgery (CSRF).
  • Evaluated critical security parameters such as the state value and authorization code to determine resilience against CSRF attacks.
  • Developed a custom Android application and analyzed real-world apps and extensions to assess OAuth integration practices.
  • Identified insecure implementations that exposed users to potential token hijacking and session fixation risks
  • Contributed to the development of a benchmark for future security audits of Android apps and browser extensions using OAuth 2.0, promoting safer authentication design.
  • Presented research findings at the Workshop on Cyber Forensics, Security, and E-discovery, part of the 23rd IEEE International Conference on Software Quality, Reliability, and Security (QRS 2023).

Skills: Android Development · OAuth2.0 · Application Security · Security · Cybersecurity · Java

Automated COVID-19 Screening Framework Using Deep CNN With Chest X-Ray Medical Images at National Central University
Automated COVID-19 Screening Framework Using Deep CNN With Chest X-Ray Medical Images
National Central University · Internship
Jun 2022 - Jul 2022 · 2 mos
Taoyuan City, Taiwan 🇹🇼 · Remote

Key Responsibilities:

  • Contributed to a research project focused on automated COVID-19 diagnosis using deep learning and chest X-ray images.
  • Developed and evaluated a convolutional neural network (CNN) model enhanced by transfer learning for accurate COVID-19 screening.
  • Utilized Grad-CAM visualizations to interpret model predictions and enhance explainability for medical practitioners.
  • Conducted experiments on publicly available datasets to assess model performance in terms of accuracy, precision, recall, and F-measure.
  • Demonstrated expertise in artificial intelligence, deep learning, and medical image analysis applied to real-world health challenges.
  • Published research findings at the 2022 6th International Conference on Information Technology (InCIT).

Skills: Public Speaking · Jupyter · Convolutional Neural Networks (CNN) · Deep Learning · Artificial Intelligence (AI) · Communication · Python

Security Vulnerabilities (CVEs)

HIGH
CVE-2025-14452
WP Customer Reviews

The WP Customer Reviews plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'wpcr3_fname' parameter in all versions up to, and including, 3.7.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

Feb 18, 2026
CRITICAL
CVE-2026-0926
Prodigy Commerce

The Prodigy Commerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.2.9 via the 'parameters[template_name]' parameter. This makes it possible for unauthenticated attackers to include and read arbitrary files or execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.

Feb 18, 2026
HIGH
CVE-2025-12707
Library Management System

The Library Management System plugin for WordPress is vulnerable to SQL Injection via the 'bid' parameter in all versions up to, and including, 3.2.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

Feb 18, 2026

Speaker & Presentations

ArsenalAccepted
Oblivion Token: M365 Conditional Access Policy Bypass OST (Offensive Tooling)
Black Hat Asia Arsenal 2026

Oblivion Token is a focused offensive-research utility that makes Microsoft 365 Conditional Access Policy (CAP) bypass testing practical, repeatable, and scriptable. Designed for red-teamers and security researchers, it systematizes token-centric workflows and exercises policy edge cases to expose where device, network, or app-context assumptions fail including realistic test paths against Microsoft first-party (built-in) applications.

Marina Bay Sands, SingaporeApril 2026
WebinarPresented
AI Security Unmasked: The Hidden Danger Behind Your AI Tools
KBTG Knowledge Sharing 2025

TBA

MS TeamsSep 2025
MeetupPresented
AI Security Research: The Rise of AI Threat (ยุคใหม่ของภัยคุกคามอัตโนมัติ)
TBCert Monthly Meeting 2025

TBA

Bangkok, ThailandMay 2025

Academic Publications

Research papers presented at international IEEE conferences

TENCON 20242025
Practical Mobile Based Services for Identification of Chicken Diseases From Fecal Images

IEEE Region 10 Conference 2024

Poultry farming is crucial to the food chain, and chicken health directly impacts product quality and safety. Diagnosing poultry diseases using polymerase chain reaction is costly, particularly for small farms. To address this, we developed a mobile-based service for farmers, enabling the identification of common chicken diseases from fecal images via a Line account. Our system achieved 86.49% segmentation precision and 95.93% classification accuracy on a large dataset, offering a practical and accessible tool for local farmers.

March 5, 2025
QRS 20232023
Detecting Vulnerable OAuth 2.0 Implementations in Android Applications

23rd IEEE International Conference on Software Quality, Reliability, and Security

OAuth 2.0, commonly used for authorization, can be susceptible to CSRF attacks in Android applications. To address this, we developed an Android app to assess other apps' use of the OAuth 2.0 state parameter—a key defense against CSRF. Our analysis, conducted on both Chrome and the default browser, evaluates whether Android apps using OAuth 2.0 are adequately protected against CSRF attacks. Our research aims to protect users by highlighting apps with potentially vulnerable OAuth 2.0 implementations.

February 19, 2024
InCIT 20222022
Automated COVID-19 Screening Framework Using Deep CNN With Chest X-Ray Medical Images

6th International Conference on Information Technology

An automated COVID-19 screening framework using chest X-ray images is proposed in this study. It leverages artificial intelligence techniques and transfer learning for accurate diagnosis. The framework extracts features using transfer learning and applies modified deep neural networks. Grad-CAM visualization supports the predicted diagnosis. Experimental results demonstrate superior performance compared to other deep learning techniques. This framework has the potential to aid in early COVID-19 diagnosis and alleviate the burden on radiologists.

March 21, 2023

Projects

Skills & Tools

Programming Languages
Web Development
Backend, Frameworks & Testing
Data Management & Search Engines
Cloud & Container Platforms
DevOps & CI/CD Tools
Penetration Testing & Vulnerability Assessment
Machine & Deep Learning
Productivity & Collaboration

Certifications

HTB Certified Junior Cybersecurity Associate certificate
HTB Certified Junior Cybersecurity Associate
Hack The Box
Sep 2025
View Credential
Jr Penetration Tester (PT1) certificate
Jr Penetration Tester (PT1)
TryHackMe
July 2025 - July 2028
View Credential
Practical SOC Analyst Associate certificate
Practical SOC Analyst Associate
TCM Security
July 2025
View Credential
SECURITY ANALYST COURSE certificate
SECURITY ANALYST COURSE
SEC Playground
July 2025
View Credential

Education

Bachelor of Science in Information and Communication Technology
Mahidol University, Thailand 🇹🇭
International Program
2020 - 2024

Activities and societies:

ICT Internship Poster Exhibition 2023 at ICT Mahidol
Sep 2023
Joined the exhibition showcasing B.Sc. ICT International Program student internships. Proudly shared my experience from Ritsumeikan University among esteemed peers. An enriching platform for insights and networking.

Bangkok Christian College
Smart Computer · GPAX 3.48
2008 - 2020

Activities and societies:

NATIONAL SOFTWARE CONTEST 19TH
This software contest was open to individuals eager to challenge themselves and gain experience in developing and presenting projects. Topics ranged from games and education to applications designed for social assistance.

Self-Learning on HackTheBox
Online Platform for Cybersecurity Training

Activities and societies:

Pro Hacker
HackTheBox Profile

Self-Learning on TryHackMe
Online Platform for Cybersecurity Training

Activities and societies:

waris.dam [0xA][WIZARD]
TryHackMe Profile

Competitions

Blog

My Resume

resume.pdf — waaris_m@portfolio

PDF preview loads on demand to keep the homepage fast.

contact.sh — bash
waaris_m@portfolio:~$ cat contact.txt
# CONTACT INFORMATION
PHONE:+66 63 954 4447
LOCATION:Bangkok, Thailand 🇹🇭
waaris_m@portfolio:~$_