Cybersecurity specialist with expertise in Product Security include CloudSec, DevSecOps, AppSec, Secure SDLC. Currently focused on strategy product security and security research.
Core Competencies:
- π Product Security (ProdSec Manager, previously held the position of startup CISO)
 - π‘ DevSecOps, AppSec, Security Champion (role of Leader, Advocate)
 - π Technical audit (corporate IT infrastructure, clouds)
 - π¦ ex-Malware Analysis & Reverse Engineering
 - πΎ ex-Digital Forensics
 
PLEASE, CLICK FOR EXPAND
This section provides direct links to key projects that demonstrate my core expertise and career trajectory in cybersecurity.
| Object | Description | |
|---|---|---|
| π | K8s Shield | Advanced Kubernetes security auditing tool with 150+ compliance checks and CIS benchmarks | 
| π | DevSecOps Notes Box, e-book | Comprehensive practical guide to implementing DevSecOps in enterprise environments | 
| βΈοΈ | Kubernetes Security, e-book | In-depth Kubernetes security handbook covering hardening, monitoring, and attack mitigation | 
| Object | Description | |
|---|---|---|
| π€ | Short Bio | Professional background and key achievements in cybersecurity spanning 15+ years | 
| π | Alma mater | Cybersecurity education foundation and academic credentials from SAPEU/SALEM | 
| Object | Description | |
|---|---|---|
| π£οΈ | 15-Year Cybersecurity Career Journey | Detailed timeline of professional growth from junior specialist to industry expert | 
| π‘ | Key Insights From My 15-Year Climb | Hard-earned lessons and strategic career advice for cybersecurity professionals | 
| π | The Chance for a Better Life Given by Cybersecurity | Personal transformation story through cybersecurity career development | 
| π | Main Career Track | Structured overview of professional milestones, roles, and responsibilities | 
| Object | Description | |
|---|---|---|
| βοΈ | Attack & Defence | CTF competition solutions and methodologies for attack-defense scenarios | 
| π§© | Puzzles | Cryptographic challenges and reverse engineering puzzles from CTF competitions | 
| π₯ | About Cr@zY Geek$ Team | University CTF team profile with member bios and competition history | 
| Object | Description | |
|---|---|---|
| π¬ | The Research | Original research on ATM security vulnerabilities and exploitation techniques | 
| Object | Description | |
|---|---|---|
| π | Academy InfoTeCS Contest | University cybersecurity competition participation and awarded solutions | 
| π | CarPWN: Tesla Model S (2017) Gateway Bypass | Shock to the System: How We 'Hacked' a Tesla | 
| π | Cracking the Vault | The challenge appeared simple on the surface: "Open the analog safe without force" | 
| Object | Description | |
|---|---|---|
| π¨βπ« | Main info | Academic profile, course curriculum, and teaching methodology in cybersecurity | 
| Object | Description | |
|---|---|---|
| π― | Hacking for Kids | Educational platform teaching ethical hacking and cybersecurity to young learners | 
| Object | Description | |
|---|---|---|
| π | Old School Hacking | long-form historical, defender-centric article on how Windows and Linux servers were typically compromised in the early/mid/late 2000s | 
| π | Hacker Culture | The True Meaning, Lost in Media Noise | 
- Areas: Cloud Security, DevSecOps infrastructure
 - Cloud Security: AWS Security Specialty, GCP Professional Security Engineer
 - Application Security: BSIMM Implementation, Microsoft Secure SDLC
 - Ethical hacking: CEH
 - Software administration: MCSA
 - Network: CCNA