CV
Hi, I’m Raye Pamber 👋
Computer Scientist | Cyber Security Expert | Vulnerability Researcher
About Me
Hey — I’m someone who thinks a little differently about the digital world.
I’ve spent years deep inside code, systems, and networks — not just building them, but breaking them apart to understand how they really work.
I’m a hacker by mindset, not just by skill.
I don’t take anything at face value. I question. I explore. I dig into what most overlook.
This space is where I share ideas, tools, and techniques from the edges of:
- Red Team Tactics
- Advanced Persistent Threat (APT) Analysis
- Vulnerability Research & Reverse Engineering
- OSINT Recon & Exploitation
- Firewall Evasion & IDS Bypass
- Malware Behavior & Sandbox Evasion
- Exploit Development
- Infrastructure Hacking
Sometimes it’s technical, sometimes it’s reflective — but always real.
If you care about truth, freedom, and the hidden layers of the internet,
you’ll probably feel right at home here.
🌐 Socials:
💻 Tech Stack
Category
Programming Languages
AssemblyScript, C, C#, C++, Dart, PHP, Ruby, Rust, Bash Script, Python, PowerShell
Cloud & Hosting
AWS, Azure, Cloudflare, Netlify, Vercel, Oracle, OpenStack, Firebase, Google Cloud, Heroku, Linode, Alibaba Cloud
Frameworks & Libraries
.NET, Angular, Anaconda, Bun, Express.js, Jinja, Apache Spark, Bootstrap, Node.js, Laravel, React, OpenCV, NestJS, Gutenberg, Drupal
DevOps & CI/CD
Apache, Apache Ant, Jenkins, NGINX, Apache Maven, Apache Tomcat, GitHub, GitLab, GitHub Actions, GitLab CI, Git, CircleCI
Databases
DynamoDB, PostgreSQL, MariaDB, SQLite, MySQL, Microsoft SQL Server, Apache Cassandra
Data Science & ML
Pandas, PyTorch, Scikit-learn, SciPy, NumPy
Tools & Other Tech
Windows Terminal, CMake, Meta (Facebook), WireGuard, Splunk, Postman, Prometheus, Kubernetes, Cisco
Game Development
Riot Games, Ubisoft, Unity, Unreal Engine, Xbox
🎓 Education
Ph.D. in Computer Science (Specialization: Cybersecurity) | 2020
University of California, Berkeley | Berkeley, CA
Dissertation: “Advanced Techniques for Zero-Day Vulnerability Discovery and Exploitation in Modern Operating Systems”
M.S. in Information Security | 2015
Carnegie Mellon University | Pittsburgh, PA
Focus: Cryptography, Network Security, Digital Forensics
B.S. in Computer Science | 2013
Stanford University | Stanford, CA
Minor: Mathematics
🛡️ Certifications
Offensive Security Certified Professional (OSCP) Offensive Security 2017 Certified Information Systems Security Professional (CISSP) (ISC)² 2019 GIAC Reverse Engineering Malware (GREM) SANS Institute 2021 Certified Ethical Hacker (CEH) EC-Council 2014
💼 Work Experience
Principal Security Engineer, Red Team Lead
CyberGuard Solutions | San Francisco, CA
January 2022 – Present
- Led a team of 5-7 Red Team operators in conducting advanced simulated attacks against critical infrastructure and applications, identifying high-impact vulnerabilities.
- Developed custom exploitation tools and sophisticated evasion techniques to bypass cutting-edge security controls (EDR, NDR, SIEM).
- Provided strategic recommendations to executive leadership on improving organizational security posture based on red team findings.
- Mentored junior security engineers in vulnerability research, exploit development, and adversary simulation methodologies.
Senior Vulnerability Researcher
SecureTech Innovations | Seattle, WA
August 2018 – December 2021
- Identified and analyzed critical vulnerabilities in commercial software, operating systems, and embedded devices, leading to multiple CVE disclosures.
- Performed in-depth reverse engineering of complex binaries and firmware to uncover hidden attack surfaces and logic flaws.
- Developed proof-of-concept exploits for identified vulnerabilities, demonstrating real-world impact and guiding remediation efforts.
- Contributed to threat intelligence by analyzing emerging APT tactics, techniques, and procedures (TTPs) and developing detection signatures.
Security Analyst
Global Cyber Defense | New York, NY
July 2015 – July 2018
- Conducted penetration tests and security assessments for web applications, networks, and cloud environments.
- Performed incident response activities, including forensic analysis, containment, eradication, and recovery.
- Monitored security events and alerts, triaging and escalating suspicious activities to senior analysts.
- Developed and automated security scripts to improve efficiency in vulnerability scanning and log analysis.