IT Security Professional · Web application | API | Network | AI

Dickson Kwong

Information security professional with 10+ years of experience specializing in web application, API, and network penetration testing, AI/LLM security assessment, security engineering, and cybersecurity training.

About

I am an information technology professional with over two decades of hands-on experience in web application, API, AI / LLM, and network security. My background includes penetration testing, security engineering, vulnerability research, and delivering security training within enterprise environments.

I operate at the intersection of offensive and defensive security, translating risk analysis into practical threat mitigation strategies and distilling complex technical findings into clear, actionable guidance for engineers, stakeholders, and executive leadership.

I have delivered IT security training nationwide for vendors such as Check Point, EC-Council, and Mile2, and I remain passionate about mentoring practitioners as they advance and establish themselves in the security field.

At a glance

  • Web application, API,and network penetration testing
  • Cloud & infrastructure security
  • AI / LLM Pentesting
  • Security architecture & engineering
  • Technical training & public speaking

Core Specialties

Pentesting

Comprehensive web application, API, and network penetration testing engagements designed to uncover exploitable vulnerabilities, demonstrate real-world attack impact, and translate findings into clear risk prioritization and actionable remediation guidance..

  • OWASP Top 10 ( Web App / AI + LLM / API / Cloud / CI-CD)
  • Cloud, On-Premise, and Remote Testing
  • AI / LLM Testing

Public Speaking & Training

Experienced instructor and speaker delivering hands-on security training and talks for conferences, enterprises, and community groups.

  • Check Point CCSA / CCSE / CCSE+ and Provider‑1
  • EC‑Council CEH, ECSA, CHFI and Mile2 CPTS
  • Conference talks on GPU cracking, Citrix, and ML security

Secure Development

Security‑minded development and code review that integrates secure design principles and practical defenses into applications and infrastructure.

  • Source code review for core applications inside organizations
  • Secure configuration of all communication paths including web and API services
  • Focused on the SDLC lifecyle and shifting left

Technical Skillset

Programming & Scripting

  • Python
  • C / C++
  • Java
  • JS
  • Bash
  • PowerShell
  • JavaScript

Security Domains & Tools

  • OWASP Top 10 ( Web App / AI + LLM / API / Cloud / CI-CD)
  • Burp Suite
  • Kali
  • DeepTeam
  • PromptFoo

Platforms & Infrastructure

  • Windows
  • Linux
  • OSX
  • Cloud
  • Containers / Pods
  • Virtualization

AI / LLM

  • PyTorch
  • NumPy
  • LoRA
  • CUDA
  • Vector db

Databases

  • ChromaDB
  • Qdrant
  • Pinecone
  • Redis
  • MongoDB

Languages

  • English (native)
  • Spanish (conversational)
  • Cantonese (conversational)

Experience & Focus

Web Application Pentesting 9+ yrs
Network Pentesting 7+ yrs
Team Leadership 6+ yrs
Open Source Development 2+ yrs

Selected Highlights

Penetration Testing

Served as Team Lead and single contributor, conducting red team penetration tests across web applications, infrastructure, and cloud environments.

Web Application Network security API Testing Cloud Testing AI / LLM Testing>

Source Code Review

Conducted secure code reviews and championed a shift-left approach by integrating security practices early in the software development lifecycle.

JS Frameworks Python C / C++ Java .NET

AI / LLM Projects

Exploring how modern AI and large language models behave under adversarial, real‑world conditions, with a focus on understanding failure modes and translating them into practical security controls.

AI / LLM PenTesting AI Jail Breaking AI Social Engineer Attacks ~ Voice / Video Cloning AI Training Custom LLMs AI Training LoRA (Low-Rank Adaptation)

Security Engineering

Hardened the Kubernetes clusters and container workloads by enforcing strict RBAC policies, enabling network segmentation, scanning images for vulnerabilities, and implementing runtime threat detection..

IaC (infrastructure as Code) AWS K8 Docker VMware

Security Instructor

Provided nationwide training across the USA for Check Point, EC-Council, Mile2, and CompTIA, empowering organizations to secure, deploy, and maintain secure network and application infrastructures.

Check Point EC‑Council Mile2 CompTIA

Community & Speaking

I enjoy contributing to the security community through talks, workshops, and local meetups. These venues keep me grounded in practitioner reality while sharing research and techniques that others can immediately apply.

Unallocated Space (2017)

Presented “Blinded by Big Data, Paralyzed by Analytics, Decipher by Machine Learning” with Kevin Figueroa, including hands‑on labs and resources published at MLresearchLab.com.

NOVA Hackers (2012)

Delivered “How to build a GPU Password Cracking Host”, demonstrating the practical realities of large‑scale password cracking.

Hack Miami & OWASP / ISSA (2010)

Talks on Citrix vulnerabilities and embedded systems (“Hacking with Gumstix”).

Recognition

2nd Place – Hack the Flag Ninja CTF, South Florida ISSA Chapter (2010)

3rd Place – Shmoocon CTF, Washington DC under “Hack Miami” team (2010)

Certifications & Education

  • CISSP
  • OSCP
  • GWAPT
  • US‑CERT Malware Apprenticeship
  • EC‑Council: CEH, ECSA, CHFI
  • Mile2 CPTS
  • Check Point: CCSA, CCSE, CCSE+, Instructor
  • CCNA
  • CompTIA A+, Network+, Sec+, CTT
  • Bachelor’s in IT Security

Contact

For consulting, penetration testing engagements, or speaking opportunities, feel free to reach out. The fastest way to contact me is via LinkedIn or GitHub.