I am a DevSecOps Engineer and Dual Student at Deutsche Telekom.
My foundation in software engineering began 2017, long before I entered the professional sector. This decade-long fluency in code allows me to deconstruct systems with the mindset of an architect, not just a script-kiddie.
My work operates at the intersection of robust software engineering (Cloud, Go, C++) and applied vulnerability research. I do not just find vulnerabilities; I understand the code that caused them.
| Language | Timeframe | Context / Use Case |
|---|---|---|
| Python | 2017—2026 | The foundation. Automation, POCs, Tooling. |
| JavaScript / Java / Kotlin | 2020-2022 | Web Exploitation, Code Review, Android (Kotlin). |
| C / C++ / x86 asm | 2022—2026 | Low-Level Systems, Malware Dev, PLC/SCADA. |
| Clojure | 2023 | Functional Programming paradigms. |
| Go (Golang) | 2024—2026 | High-Performance Cloud Infra & Modern C2. |
| Zig / Nim / Rust | 2025—2026 | Next-Gen Offensive Engineering & Evasion. |
Focusing on Cloud Security, infrastructure automation, and secure software delivery in a high-compliance enterprise environment.
Designed and implemented Intrusion Detection Systems (IDS) for industrial environments. Worked directly with Programmable Logic Controllers (PLCs) and network security protocols.
Backend development with a focus on functional programming paradigms.
I have been competing since 2020, focusing on Active Directory exploitation, Red Teaming, and Binary Exploitation.
Current training objectives to support my role at Telekom and personal research.
// END OF RECORD