I work at the intersection of security operations, infrastructure engineering, and network engineering — a combination that came from spending years trying to break things and then being the one responsible for fixing them.
My background spans red team operations, building secure cloud environments, vulnerability research, and developing automations to make systems work faster and more effective. I care about understanding systems at a deep level, not just at the surface.
what I do
When I’m not disecting log files for a living, I’m usually building automations — or writing about what I’ve learned along the way.
- Offensive security — adversary simulation, red team ops, automated pentetation testing
- Secure infrastructure — cloud architecture, hardening, automation at scale
- Security research — vulnerability discovery, CVE work, aversarial tracking
- Software development — security tooling, automation, backend systems
skills
offensive
- Red teaming
- Scripting
- Scanning
infrastructure
- AWS / GCP / Azure
- Terraform / Ansible
- Kubernetes
- CI/CD pipelines
- Proxmox / KVM
development
- Python
- Powershell
- Bash / shell scripting
research
- Reverse engineering
- Binary analysis
- Fuzzing
- Protocol research
- CVE development
elsewhere
- GitHub: [fill in]
- Contact: [fill in]