About Me

Daniel Monzón - Security Researcher
I am a security researcher with over 6 years of experience in web pentesting, code review, infrastructure (internal and external pentests), mobile audits (Android and iOS), thick-client security assessments as well as red team exercises and SAP security audits. Worked in companies such as Halborn, Siemens and Innotec/Accenture, helping secure their systems and their client’s.
Occasional speaker at security conferences such as: hack0n, RootedCON Málaga, DragonJARCON, etc. I hold multiple industry-recognized certifications, such as: OSCP, CRTP, eMAPT, CARTP, etc. I’ve also found multiple security vulnerabilities in open-source and commercial products, such as CVE-2020-27461 or CVE-2020-7361 and I’m always eager to learn more and find more and more vulnerabilities across complex infrastructures and codebases.
Technical Skills
Offensive Security
- Red Team Operations: Multi-phase adversary simulation, Purple Team exercises/Atomic Red Teams
- Active Directory: Privilege escalation, lateral movement and persistence
- Web Application Security: web hacking and API pentesting
- Mobile Security: Android & iOS application pentesting
- Infrastructure Testing: Internal/external network assessments, endpoint security
- Thick Client Testing: Desktop application security, protocol analysis
Cloud & Container Security
- Cloud Platforms: Azure, AWS, GCP security assessments and exploitation
- Kubernetes: Cluster pentesting, container escape, misconfigurations
- Azure/Entra: Identity attacks, privilege escalation, conditional access bypass
Specialized Domains
- AI Red Teaming: LLM security, Model Context Protocol (MCP)
- Blockchain/Web3: Smart contract auditing, cryptographic protocol analysis
- OT/ICS: SCADA systems, industrial control systems security
- IoT Security: Device firmware analysis, hardware hacking
- SAP Security: ERP security assessments, configuration reviews
- Wireless: Wi-Fi pentesting (WEP/WPA2/WPA3), 802.11 exploitation
Binary Analysis & Exploitation
- Operating Systems: Windows internals (primary), macOS, Linux kernel knowledge
- Reverse Engineering: IDA Pro, Ghidra, binary analysis
- Exploitation: Stack/heap exploitation, ROP chains, kernel exploits
- Fuzzing: Coverage-guided fuzzing, vulnerability discovery
Development & Tooling
- Languages: Python (primary), C/C++, JavaScript, Go, Rust
- Code Review: Security analysis in JavaScript, PHP, C#, C++, Java, Golang, Rust, Solidity, etc
Social Engineering
- Phishing: Campaign design and execution, payload delivery
- Security Awareness: Training delivery, user testing
Professional Experience
Offensive Security Engineer | Halborn
December 2025 - Present
Currently working on advanced security assessments for blockchain and Web3-related entities, including:
- Security code review for projects in different languages (Javascript, Golang, etc)
- Red team exercises targeting Web3 organizations
- Web application penetration testing for crypto platforms
- Mobile application security assessments (iOS/Android)
- Cryptographic protocol analysis and vulnerability research
Red Team Operator | Siemens
January 2024 - December 2025
- Executed red team engagements simulating advanced persistent threats
- Conducted thick-client application security assessments
- Performed security research on AI/ML systems and emerging AI red teaming techniques
- Developed custom tooling for internal security assessments
- Delivered cloud security reviews for Azure/Entra environments
Security Consultant | Innotec Security (now Accenture)
July 2021 - December 2023
Delivered comprehensive security assessments across diverse technologies and environments:
- Infrastructure Security: Internal/external penetration testing, network security assessments
- Application Security: Web application testing, mobile app audits (iOS/Android), API security
- Cloud Security: AWS security assessments and noise testing, Kubernetes cluster penetration testing
- Enterprise Applications: SAP security audits and configuration reviews
- Wireless Security: Wi-Fi network assessments (WEP, WPA2/WPA3 attacks)
- Social Engineering: Designed and executed phishing campaigns and security awareness training
- Red Team Operations: Multi-phase adversary simulation exercises
- Code Review: Security analysis of custom applications and third-party integrations
- Financial systems security: executed security assessments of SWIFT and mainframe systems
Penetration Tester | Atalanta Evolution
March 2020 - May 2021
Conducted security assessments and contributed to the security community:
- Education: Instructor for Master’s in Ethical Hacking program at San Pablo CEU University
- Red Team: Planned and executed red team exercises for enterprise clients
- Code Analysis: Security review of applications in multiple languages (NodeJS, C#, PHP, Ruby, Python, Java, Apex/Salesforce)
- Technical Writing: Authored security research articles for company blog
- Diverse Assessments: Web applications, mobile apps, infrastructure, APIs, ICS/SCADA systems, IoT devices
- Specialized Testing: Industrial control systems and critical infrastructure security
Professional Certifications
Current Certifications
Specialized Training
- 🔒 Offensive Driver Development - Zeropoint Security
- 🦠 Malware Development Advanced - Sektor7
- 🪟 Accelerated Windows API for Software Diagnostics
Currently Pursuing
- 🎯 CRTO2 - Advanced Red Team Operations (AV/EDR evasion focus)
- ☁️ CARTE - Certified Azure Red Team Expert
- 🔬 Independent Research - Operating System internals, Web3 security and cloud
Contact
Feel free to reach out for security research collaboration, consulting inquiries, or speaking opportunities.
- Email: daniel.monzonpeso@gmail.com
- LinkedIn: Daniel Monzón
- GitHub: stark0de
- Twitter/X: @stark0de1