Cybersecurity specialist with expertise in Product Security include CloudSec, DevSecOps, AppSec, Secure SDLC. Currently focused on strategy product security and security research.
Core Competencies:
- 🔍 Product Security (ProdSec Manager, previously held the position of startup CISO)
- 📡 DevSecOps, AppSec, Security Champion (role of Leader, Advocate)
- 🔒 Technical audit (corporate IT infrastructure, clouds)
- 🦠 ex-Malware Analysis & Reverse Engineering
- 💾 ex-Digital Forensics
PLEASE, CLICK FOR EXPAND
This section provides direct links to key projects that demonstrate my core expertise and career trajectory in cybersecurity.
| Object | Description | |
|---|---|---|
| 🔐 | K8s Shield | Advanced Kubernetes security auditing tool with 150+ compliance checks and CIS benchmarks |
| 📚 | DevSecOps Notes Box, e-book | Comprehensive practical guide to implementing DevSecOps in enterprise environments |
| ☸️ | Kubernetes Security, e-book | In-depth Kubernetes security handbook covering hardening, monitoring, and attack mitigation |
| Object | Description | |
|---|---|---|
| 👤 | Short Bio | Professional background and key achievements in cybersecurity spanning 15+ years |
| 🎓 | Alma mater | Cybersecurity education foundation and academic credentials from SAPEU/SALEM |
| Object | Description | |
|---|---|---|
| 🛣️ | 15-Year Cybersecurity Career Journey | Detailed timeline of professional growth from junior specialist to industry expert |
| 💡 | Key Insights From My 15-Year Climb | Hard-earned lessons and strategic career advice for cybersecurity professionals |
| 🌟 | The Chance for a Better Life Given by Cybersecurity | Personal transformation story through cybersecurity career development |
| 📈 | Main Career Track | Structured overview of professional milestones, roles, and responsibilities |
| Object | Description | |
|---|---|---|
| ⚔️ | Attack & Defence | CTF competition solutions and methodologies for attack-defense scenarios |
| 🧩 | Puzzles | Cryptographic challenges and reverse engineering puzzles from CTF competitions |
| 👥 | About Cr@zY Geek$ Team | University CTF team profile with member bios and competition history |
| Object | Description | |
|---|---|---|
| 🔬 | The Research | Original research on ATM security vulnerabilities and exploitation techniques |
| Object | Description | |
|---|---|---|
| 🏅 | Academy InfoTeCS Contest | University cybersecurity competition participation and awarded solutions |
| 🏅 | CarPWN: Tesla Model S (2017) Gateway Bypass | Shock to the System: How We 'Hacked' a Tesla |
| 🏅 | Cracking the Vault | The challenge appeared simple on the surface: "Open the analog safe without force" |
| Object | Description | |
|---|---|---|
| 👨🏫 | Main info | Academic profile, course curriculum, and teaching methodology in cybersecurity |
| Object | Description | |
|---|---|---|
| 🎯 | Hacking for Kids | Educational platform teaching ethical hacking and cybersecurity to young learners |
| Object | Description | |
|---|---|---|
| 🔍 | Old School Hacking | long-form historical, defender-centric article on how Windows and Linux servers were typically compromised in the early/mid/late 2000s |
| 🔍 | Hacker Culture | The True Meaning, Lost in Media Noise |
- Areas: Cloud Security, DevSecOps infrastructure
- Cloud Security: AWS Security Specialty, GCP Professional Security Engineer
- Application Security: BSIMM Implementation, Microsoft Secure SDLC
- Ethical hacking: CEH
- Software administration: MCSA
- Network: CCNA