I work in cybersecurity with a strong focus on how systems actually behave once they leave the lab and hit the real world.
Most of my time is spent breaking things apart , networks, embedded devices, cloud services, and poorly thought out assumptions , to understand how they fail, how they’re abused, and how they can be made better. I’m especially interested in areas where disciplines overlap like where hardware meets software, firmware meets networking, and theory meets reality.
Professionally, my background is rooted in offensive security, infrastructure, and research. I hold multiple industry certifications and spend a lot of time building internal tools, monitoring pipelines, and attack simulations rather than just running point-and-shoot tests. If something looks like a black box, I usually want to open it.
Outside of pure cybersecurity, I’m deeply hands-on. I tinker with electronics, reverse firmware, poke at undocumented protocols, and run an over-engineered home lab that probably exists more for curiosity than necessity. I enjoy projects that start simple and slowly spiral into “this is more complicated than it needs to be” , usually in a good way.
This blog exists as a place to document that process.
You’ll find write-ups on:
- Real-world security research and investigations
- Hardware and firmware analysis
- Network monitoring, telemetry, and weird traffic
- Tools I build to solve problems I couldn’t find good answers for
- Lessons learned the hard way
I’m not here to sell hype, shortcuts, or miracle tools. I care about understanding systems properly, sharing what works (and what doesn’t), and leaving things better documented than I found them.
If you’re curious, methodical, and comfortable sitting with complexity for a while, you’ll probably feel at home here.