Cybersecurity engineer transforming from successful hospitality management to tech, bringing unique perspectives on system reliability, crisis management, and user experience. Currently building AI-powered automation systems while preparing for OSCP certification.
π What I Bring to the Table#
Unique Value: I debug systems like I debug recipes β methodically, creatively, and with an eye for what users actually need. My 7+ years in high-pressure customer environments taught me that the best security is invisible to users but bulletproof against threats.
Core Competencies#
- Security Engineering: Penetration testing, forensics, cryptography implementation
- Infrastructure Automation: Docker orchestration, n8n workflows, AI/MCP integration
- Problem Solving: From diagnosing hardware failures to architecting cloud solutions
- Communication: Technical concepts explained clearly (check my blog for proof!)
- Languages: Fluent in English, Italian, French + Python, Bash, JavaScript, C
π» Technical Arsenal#
Security Automation Cloud AI Integration
Current Tech Stack#
| Category | Technologies | Proficiency |
|---|---|---|
| Languages | Python, Bash, JavaScript, C, Java | ββββββββββ 80% |
| Security Tools | Metasploit, Burp Suite, Wireshark, John, Nmap | ββββββββββ 70% |
| Infrastructure | Docker, Kubernetes, Proxmox, Linux (Arch/Debian) | ββββββββββ 80% |
| Automation | n8n, Ansible, GitHub Actions, Claude MCP | ββββββββββ 90% |
| Cloud Platforms | AWS, Digital Ocean, Cloudflare | ββββββββββ 60% |
| Databases | PostgreSQL, Redis, MongoDB | ββββββββββ 70% |
Active Learning#
Currently deep-diving into:
- OSCP Preparation: Active exploitation and privilege escalation
- Cloud Security: AWS security architecture and compliance
- AI Integration: Building MCP servers for Claude, RAG systems
- Malware Analysis: Reverse engineering and sandbox environments
π― Notable Projects#
AI-Powered Automation Platform
2024-Present
n8n + Claude Desktop Integration
Built a comprehensive automation system combining n8n workflows with Claude AI via Docker and MCP: - Architected microservices infrastructure handling 1000+ automated tasks daily - Implemented secure MCP bridge for AI-to-system communication - Created 50+ reusable workflow templates for DevOps automation - **Tech**: Docker, Node.js, n8n, MCP Protocol, PostgreSQL [Read the Technical Deep-Dive β](/posts/agentic-ai-n8n/)Homelab Security Infrastructure
2023-Present
Proxmox-based Testing Environment
Designed and maintain a comprehensive security testing lab: - 10+ VMs running various security distributions (Kali, Parrot, REMnux) - Automated vulnerability scanning and reporting pipeline - Isolated network segments for malware analysis - Continuous monitoring with Grafana/Prometheus - **Tech**: Proxmox, pfSense, ELK Stack, Docker SwarmTechnical Blog & Knowledge Base
2023-Present
fritz-the-cat.xyz
Author technical content on cybersecurity and automation: - In-depth tutorials on AI automation and security practices - 15+ articles covering Docker, n8n, MCP, and security topics - Active community engagement and knowledge sharing - **Impact**: 500+ monthly readers, featured in security newsletters
πΌ Professional Journey#
Cafe Manager β Tech Leader
2018-Present
Bistrotheque, London
**Why this matters for tech**: Managing a high-volume operation taught me systems thinking and crisis management. **Key Achievements**: - Orchestrated operations for 200+ daily customers with 99.9% satisfaction rate - Implemented inventory tracking system reducing waste by 30% - Led team of 12 through COVID pivots, maintaining full employment - **Transferable Skills**: Incident response, resource optimization, stakeholder communication **Tech Projects on the Side**: - Built automated scheduling system using Python - Deployed Raspberry Pi POS monitoring system - Created data analytics dashboard for sales optimizationSenior Repair Technician
2016-2018
Minko's Macs, London
**Rapid Growth**: Promoted from entry to senior technician in 4 weeks **Technical Achievements**: - Diagnosed and repaired 300+ devices monthly across Mac/PC platforms - Achieved 95% first-time fix rate through systematic troubleshooting - Implemented secure data recovery protocols protecting customer privacy - Trained 5 junior technicians in hardware diagnostics - **Skills Gained**: Hardware forensics, data recovery, customer security educationInternational Experience & Self-Study
2013-2016
London, Sydney, Paris
**The Foundation Years**: While working in hospitality across three continents, I: - Self-taught programming fundamentals (Python, C) - Completed 100+ hours of online security courses - Built first homelab in a Sydney sharehouse - Contributed to open-source security tools - **Key Learning**: Real-world experience + self-discipline = unstoppable growth
π Education & Certifications#
BSc (Hons) Cyber Security and Computer Forensics
2018-2021
University of Greenwich, London | 2:1
**Core Modules**: Cryptography, Penetration Testing, Digital Forensics, Network Security, Malware Analysis **Dissertation**: "Automated Threat Detection in Containerized Environments" - Developed Python-based monitoring system for Docker containers - Achieved 15% better threat detection than commercial solutionsCertifications & Training
2021-Present
Continuous Learning
**Completed**: - Google Cybersecurity Professional Certificate (2024) - Docker Certified Associate prep (2024) - THM Advanced Penetration Testing Path (2023) **In Progress**: - OSCP (Exam scheduled Q2 2025) - AWS Security Specialty - CCNP Enterprise
π Why Iβm Different#
The Hospitality Advantage: Iβve handled angry customers at 2 AM and debugged production systems at 3 AM. Both require patience, systematic thinking, and grace under pressure. I bring a unique blend of technical expertise and human understanding to security challenges.
What Colleagues Say#
βFritz approaches technical problems like a chef perfecting a recipe β methodically, creatively, and always with the end user in mind.β - Former Minkoβs Macs Customer
βRare combination of deep technical knowledge and ability to explain complex concepts simply.β - Blog Reader
π« Letβs Connect#
- Email: your.email@example.com
- Location: London, UK (EU Citizen, UK Work Rights)
- GitHub: github.com/yourusername
- Blog: fritz-the-cat.xyz
- LinkedIn: linkedin.com/in/yourprofile
Open to: Security Engineering, DevSecOps, Infrastructure Automation, and Technical Leadership roles where I can blend security expertise with automation innovation.
Last updated: January 2025

