to the infinity and beyond

to the infinity and beyond

Menuka

Deshan

ethical_hacker | BUG_Bounty_Hunter | Web Developer

Your security
is my puzzle.

Find_the_gap.

root

ACCESS_GRANTED

No system is
absolute.

Code_is_language.

NULL

logic_is_truth.

PENTESTING
CYBERSECURITY
WEB DEVELOPMENT
REVERSE ENGINEERING
MALWARE ANALYSIS
PENTESTING
CYBERSECURITY
WEB DEVELOPMENT
REVERSE ENGINEERING
MALWARE ANALYSIS
PENTESTING
CYBERSECURITY
WEB DEVELOPMENT
REVERSE ENGINEERING
MALWARE ANALYSIS
PENTESTING
CYBERSECURITY
WEB DEVELOPMENT
REVERSE ENGINEERING
MALWARE ANALYSIS
CLOUD SECURITY
ETHICAL HACKING
RED TEAMING
CRYPTOGRAPHY
INCIDENT RESPONSE
CLOUD SECURITY
ETHICAL HACKING
RED TEAMING
CRYPTOGRAPHY
INCIDENT RESPONSE
CLOUD SECURITY
ETHICAL HACKING
RED TEAMING
CRYPTOGRAPHY
INCIDENT RESPONSE
CLOUD SECURITY
ETHICAL HACKING
RED TEAMING
CRYPTOGRAPHY
INCIDENT RESPONSE

Discovery_Log_v3.2

GET_TO_KNOW

GET_TO_KNOW

MENUKA DESHAN

MENUKA DESHAN

Passionate about the intersection of infrastructure and security. I specialize in building resilient systems that stand the test of time and adversaries.

PROFILE_SUMMARY

A motivated IT professional with a strong foundation in programming, ethical hacking, and cybersecurity. Expert in managing Windows/Linux servers and virtual infrastructures.

CONTACT_DETAILS

Emailmenukadeshan20@gmail.com
Phone0770403648
AddressNo 20, Kurunda, Wadduwa
Academic Journey

EDUCATION

EDUCATION

BACKGROUND

BACKGROUND

2010 - 2020

G.C.E A/L & O/L

Wadduwa Central College

Successfully completed G.C.E Advanced Level in the Maths Stream and Ordinary Level.

2023 - 2024

FULL STACK DEVELOPER

University of Moratuwa

Completed intensive trainee program covering the full software development lifecycle.

2021 - 2025

Higher National Diploma in IT

SLIATE

Focused on Software Development, Networking, and Information Systems management.

WORK EXPERIENCE

WORK

WORK

EXPERIENCE

EXPERIENCE

Feb 2025 – Aug 2025

IT INTERN

Rainco (Pvt) Ltd

Supported daily IT operations, system monitoring, and hardware/software troubleshooting.

Sep 2025 – Present

ASSOCIATE IT ADMINISTRATOR

Rainco (Pvt) Ltd

Managing enterprise IT systems and designing WhatsApp-based support automation.

CCNA: Switching, Routing & Wireless
Verified
Cisco Networking Academy

Cisco verifies the earner successfully completed the Switching, Routing, and Wireless Essentials course and achieved this student level credential.

CCNA: Switching, Routing & Wireless

Cisco Networking Academy2023
Full Stack Developer
Verified
University of Moratuwa

Intensive training program covering modern web technologies, software engineering practices, and full-stack architecture.

Full Stack Developer

University of Moratuwa2024
Cybersecurity Professional
Verified
Google / Coursera

Professional certificate demonstrating proficiency in security principles, risk management, and network security protocols.

Cybersecurity Professional

Google / Coursera2023
Foundations of Cybersecurity
Verified
Google

Mastered fundamental security concepts, threat landscapes, defensive strategies, and foundational cybersecurity frameworks.

Foundations of Cybersecurity

Google2023
Network Defense Essentials
Verified
EC-Council

Acquired core security skills to actively protect, defend, and monitor network environments against emerging cyber threats.

Network Defense Essentials

EC-Council2023
FCF - Getting Started in Cybersecurity 3.0
Verified
Fortinet Training Institute

Completed Fortinet's foundational cybersecurity course covering threat landscapes, network security principles, and essential defense strategies.

FCF - Getting Started in Cybersecurity 3.0

Fortinet Training Institute2025

Tap on cards to inspect

Current Stack

TECH ARSENAL

FortiGate
FortiGate
OPNsense
OPNsense
Burp Suite
Burp Suite
Kali Linux
Kali Linux
Hack The Box
Hack The Box
Metasploit
Metasploit
Wireshark
Wireshark
TryHackMe
TryHackMe
FortiGate
FortiGate
OPNsense
OPNsense
Burp Suite
Burp Suite
Kali Linux
Kali Linux
Hack The Box
Hack The Box
Metasploit
Metasploit
Wireshark
Wireshark
TryHackMe
TryHackMe
FortiGate
FortiGate
OPNsense
OPNsense
Burp Suite
Burp Suite
Kali Linux
Kali Linux
Hack The Box
Hack The Box
Metasploit
Metasploit
Wireshark
Wireshark
TryHackMe
TryHackMe
FortiGate
FortiGate
OPNsense
OPNsense
Burp Suite
Burp Suite
Kali Linux
Kali Linux
Hack The Box
Hack The Box
Metasploit
Metasploit
Wireshark
Wireshark
TryHackMe
TryHackMe
FortiGate
FortiGate
OPNsense
OPNsense
Burp Suite
Burp Suite
Kali Linux
Kali Linux
Hack The Box
Hack The Box
Metasploit
Metasploit
Wireshark
Wireshark
TryHackMe
TryHackMe
FortiGate
FortiGate
OPNsense
OPNsense
Burp Suite
Burp Suite
Kali Linux
Kali Linux
Hack The Box
Hack The Box
Metasploit
Metasploit
Wireshark
Wireshark
TryHackMe
TryHackMe
Ubuntu
Ubuntu
Debian
Debian
VMware
VMware
VirtualBox
VirtualBox
TrueNAS
TrueNAS
Docker
Docker
Proxmox
Proxmox
Cloudflare
Cloudflare
Ubuntu
Ubuntu
Debian
Debian
VMware
VMware
VirtualBox
VirtualBox
TrueNAS
TrueNAS
Docker
Docker
Proxmox
Proxmox
Cloudflare
Cloudflare
Ubuntu
Ubuntu
Debian
Debian
VMware
VMware
VirtualBox
VirtualBox
TrueNAS
TrueNAS
Docker
Docker
Proxmox
Proxmox
Cloudflare
Cloudflare
Ubuntu
Ubuntu
Debian
Debian
VMware
VMware
VirtualBox
VirtualBox
TrueNAS
TrueNAS
Docker
Docker
Proxmox
Proxmox
Cloudflare
Cloudflare
Ubuntu
Ubuntu
Debian
Debian
VMware
VMware
VirtualBox
VirtualBox
TrueNAS
TrueNAS
Docker
Docker
Proxmox
Proxmox
Cloudflare
Cloudflare
Ubuntu
Ubuntu
Debian
Debian
VMware
VMware
VirtualBox
VirtualBox
TrueNAS
TrueNAS
Docker
Docker
Proxmox
Proxmox
Cloudflare
Cloudflare
Laravel
Laravel
PHP
PHP
n8n
n8n
JavaScript
JavaScript
React
React
MySQL
MySQL
Git
Git
Notion
Notion
Laravel
Laravel
PHP
PHP
n8n
n8n
JavaScript
JavaScript
React
React
MySQL
MySQL
Git
Git
Notion
Notion
Laravel
Laravel
PHP
PHP
n8n
n8n
JavaScript
JavaScript
React
React
MySQL
MySQL
Git
Git
Notion
Notion
Laravel
Laravel
PHP
PHP
n8n
n8n
JavaScript
JavaScript
React
React
MySQL
MySQL
Git
Git
Notion
Notion
Laravel
Laravel
PHP
PHP
n8n
n8n
JavaScript
JavaScript
React
React
MySQL
MySQL
Git
Git
Notion
Notion
Laravel
Laravel
PHP
PHP
n8n
n8n
JavaScript
JavaScript
React
React
MySQL
MySQL
Git
Git
Notion
Notion

Iexploresystemsbreakboundariesandsecurewhatothersoverlook