I work at the intersection of security operations, infrastructure engineering, and network engineering — a combination that came from spending years trying to break things and then being the one responsible for fixing them.

My background spans red team operations, building secure cloud environments, vulnerability research, and developing automations to make systems work faster and more effective. I care about understanding systems at a deep level, not just at the surface.


what I do

When I’m not disecting log files for a living, I’m usually building automations — or writing about what I’ve learned along the way.

  • Offensive security — adversary simulation, red team ops, automated pentetation testing
  • Secure infrastructure — cloud architecture, hardening, automation at scale
  • Security research — vulnerability discovery, CVE work, aversarial tracking
  • Software development — security tooling, automation, backend systems

skills

offensive

  • Red teaming
  • Scripting
  • Scanning

infrastructure

  • AWS / GCP / Azure
  • Terraform / Ansible
  • Kubernetes
  • CI/CD pipelines
  • Proxmox / KVM

development

  • Python
  • Powershell
  • Bash / shell scripting

research

  • Reverse engineering
  • Binary analysis
  • Fuzzing
  • Protocol research
  • CVE development

elsewhere

  • GitHub: [fill in]
  • Contact: [fill in]