Digital Sovereignty β’ Cloud-Native Security β’ Open Source β’ Data Privacy β’ Next-Gen SOC β’ Endpoint Protection β’ Network Defense
I am a Cyber Security Engineer operating on the principle: "To learn defense, one must master offense." I bridge low-level system understanding with enterprise-scale defense architectures.
Security starts at the hardware level. By mastering Assembly and C, I use granular system knowledge to design Security Observability strategies that turn hardware limits into defensive advantages.
Starting in Red Team operations, I scaled this adversarial mindset into defensive engineering:
- Incident Response: Neutralizing complex threats in financial sectors.
- Threat Hunting: Converting intelligence into proactive defense.
- Hardening: Optimizing resilience and system integrity.
My focus is The Ubuntu Sovereign Stackβarchitecting an open-source enterprise alternative for total data autonomy, integrating:
- Automated Orchestration: Self-healing environments.
- Unified IAM: Secure, open-source directory services.
- Full-Stack Observability: Deep visibility via SIEM.
| Project | Description | Tech Stack |
|---|---|---|
| Ubuntu Sovereign Stack | Open-source infrastructure stack for digital sovereignty. | Ubuntu, Self-Hosted |
| Elastic Stack Builder | Automated Elastic Stack deployment on Ubuntu Jammy (22.04). | ELK, Ubuntu, SIEM |
| NPM Supply Chain Analysis | Analysis of NPM dependency risks using centrality metrics. | Python, NetworkX |
| ApiGoat | Deliberately vulnerable REST API for OWASP Top 10 training. | Go, API Security |
| MCP Agentic Review | Security analysis of the Model Context Protocol ecosystem. | AI Security, Research |
| WebVuln Runner | Docker TUI runner for deploying vulnerable labs (Juice Shop, etc.). | Docker, Python |
- USOM - Penetration Testing Specialist
- LetsDefend - SOC Analyst
- TryHackMe - Red Team Operator
- Cisco - Network Security