Cybersecurity specialist with expertise in Product Security include CloudSec, DevSecOps, AppSec, Secure SDLC. Currently focused on strategy product security and security research.
Core Competencies:
- π Product Security (ProdSec Manager, previously held the position of startup CISO)
- π‘ DevSecOps, AppSec, Security Champion (role of Leader, Advocate)
- π Technical audit (corporate IT infrastructure, clouds)
- π¦ ex-Malware Analysis & Reverse Engineering
- πΎ ex-Digital Forensics
PLEASE, CLICK FOR EXPAND
This section provides direct links to key projects that demonstrate my core expertise and career trajectory in cybersecurity.
| Object | Description | |
|---|---|---|
| π | K8s Shield | Advanced Kubernetes security auditing tool with 150+ compliance checks and CIS benchmarks |
| π | DevSecOps Notes Box, e-book | Comprehensive practical guide to implementing DevSecOps in enterprise environments |
| βΈοΈ | Kubernetes Security, e-book | In-depth Kubernetes security handbook covering hardening, monitoring, and attack mitigation |
| Object | Description | |
|---|---|---|
| π€ | Short Bio | Professional background and key achievements in cybersecurity spanning 15+ years |
| π | Alma mater | Cybersecurity education foundation and academic credentials from SAPEU/SALEM |
| Object | Description | |
|---|---|---|
| π£οΈ | 15-Year Cybersecurity Career Journey | Detailed timeline of professional growth from junior specialist to industry expert |
| π‘ | Key Insights From My 15-Year Climb | Hard-earned lessons and strategic career advice for cybersecurity professionals |
| π | The Chance for a Better Life Given by Cybersecurity | Personal transformation story through cybersecurity career development |
| π | Main Career Track | Structured overview of professional milestones, roles, and responsibilities |
| Object | Description | |
|---|---|---|
| βοΈ | Attack & Defence | CTF competition solutions and methodologies for attack-defense scenarios |
| π§© | Puzzles | Cryptographic challenges and reverse engineering puzzles from CTF competitions |
| π₯ | About Cr@zY Geek$ Team | University CTF team profile with member bios and competition history |
| Object | Description | |
|---|---|---|
| π¬ | The Research | Original research on ATM security vulnerabilities and exploitation techniques |
| Object | Description | |
|---|---|---|
| π | Academy InfoTeCS Contest | University cybersecurity competition participation and awarded solutions |
| π | CarPWN: Tesla Model S (2017) Gateway Bypass | Shock to the System: How We 'Hacked' a Tesla |
| π | Cracking the Vault | The challenge appeared simple on the surface: "Open the analog safe without force" |
| Object | Description | |
|---|---|---|
| π¨βπ« | Main info | Academic profile, course curriculum, and teaching methodology in cybersecurity |
| Object | Description | |
|---|---|---|
| π― | Hacking for Kids | Educational platform teaching ethical hacking and cybersecurity to young learners |
| Object | Description | |
|---|---|---|
| π | Old School Hacking | long-form historical, defender-centric article on how Windows and Linux servers were typically compromised in the early/mid/late 2000s |
| π | Hacker Culture | The True Meaning, Lost in Media Noise |
- Areas: Cloud Security, DevSecOps infrastructure
- Cloud Security: AWS Security Specialty, GCP Professional Security Engineer
- Application Security: BSIMM Implementation, Microsoft Secure SDLC
- Ethical hacking: CEH
- Software administration: MCSA
- Network: CCNA