Profile

The Operator & Researcher

CURRENT ROLE
DevSecOps Engineer
TOTAL EXP
9 Years (Engineering)
SEC OPS
6 Years (CTF/Red Team)
LOCATION
Germany

// Operational Profile

I am a DevSecOps Engineer and Dual Student at Deutsche Telekom.

My foundation in software engineering began 2017, long before I entered the professional sector. This decade-long fluency in code allows me to deconstruct systems with the mindset of an architect, not just a script-kiddie.

My work operates at the intersection of robust software engineering (Cloud, Go, C++) and applied vulnerability research. I do not just find vulnerabilities; I understand the code that caused them.

Technical Arsenal

Language Timeframe Context / Use Case
Python 2017—2026 The foundation. Automation, POCs, Tooling.
JavaScript / Java / Kotlin 2020-2022 Web Exploitation, Code Review, Android (Kotlin).
C / C++ / x86 asm 2022—2026 Low-Level Systems, Malware Dev, PLC/SCADA.
Clojure 2023 Functional Programming paradigms.
Go (Golang) 2024—2026 High-Performance Cloud Infra & Modern C2.
Zig / Nim / Rust 2025—2026 Next-Gen Offensive Engineering & Evasion.

// Deployment History

Deutsche Telekom

DevSecOps Engineer (Dual Study) // Sept 2025 – Present

Focusing on Cloud Security, infrastructure automation, and secure software delivery in a high-compliance enterprise environment.

Golang Bash Cloud

U-Glow

IDS Architect & Engineer // Sept 2023 – Dec 2023

Designed and implemented Intrusion Detection Systems (IDS) for industrial environments. Worked directly with Programmable Logic Controllers (PLCs) and network security protocols.

C++ PLC/SCADA

doctronic GmbH & Co. KG

Software Development Internship // July 2023 – Aug 2023

Backend development with a focus on functional programming paradigms.

Clojure

// Active Operations

Offensive Security

I have been competing since 2020, focusing on Active Directory exploitation, Red Teaming, and Binary Exploitation.

  • Hack The Box // Since Dec 2020
    Top ranks in Reverse Engineering & AD Pivoting.
  • TryHackMe // Since March 2021
    Focus on Network Penetration Testing.

Strategic Roadmap

Current training objectives to support my role at Telekom and personal research.

  • Active: HTB CPTS (Certified Penetration Testing Specialist).
  • Target: HTB CAPE (Certified Active Directory Penetration Exploitation).
  • Target: HTB CWEE (Certified Web Exploitation Expert).
  • Target: Maldev Academy (Certified Advanced Malware Developer).
  • Target: OffSec OSEP (OffSec Experienced Penetration Tester).
  • Target: OffSec OSED (OffSec Exploitation Developer).
  • Target: OffSec OSEE (OffSec Exploitation Expert).

// END OF RECORD