Skip to main content

Curriculum Vitae

·4 mins
Table of Contents
GitHub LinkedIn Email
Security engineer with a cybersecurity degree, AI/automation expertise, and 10+ years of leadership in high-pressure environments. Building at the intersection of security and AI.

Core Competencies
#

Incident Response DFIR Detection Engineering SIEM Cloud Security AI Security Threat Hunting

  • Security Engineering — penetration testing, digital forensics, cryptography, detection rule writing
  • Infrastructure Automation — Cloudflare Workers, Docker, CI/CD, AI agent pipelines
  • AI Integration — LLM-powered security automation, prompt injection testing, MCP protocol
  • Communication — technical writing, incident reporting, cross-team coordination
  • Languages — English, Italian, French fluent; Python, TypeScript, Bash, C

Technical Skills
#

CategoryTechnologies
Security ToolsNmap, Burp Suite, Wireshark, Metasploit, Volatility, Autopsy
SIEM / DetectionSigma rules, YARA, ELK Stack, Splunk (learning)
LanguagesPython, TypeScript, Bash, C, SQL
InfrastructureDocker, Kubernetes, Proxmox, Linux (Debian/Arch), Cloudflare Workers
CloudAWS, Cloudflare, Digital Ocean
AutomationCustom AI pipelines, GitHub Actions, Ansible
DatabasesPostgreSQL, Redis, MongoDB

Projects
#

  1. PAI — Personal AI Infrastructure

    2025-Present

    AI Agent Security Automation

    Built a comprehensive AI infrastructure system that automates security workflows: - 10 Cloudflare Workers handling daily security news, CVE monitoring, TryHackMe tracking, and study automation - Custom LLM pipelines for security content analysis and writeup generation - Event-driven architecture with Discord notifications and scheduled cron triggers - **Tech:** TypeScript, Cloudflare Workers, Anthropic API, Discord webhooks
  2. Home Lab

    2023-Present

    Security Testing Environment

    Designed and maintain a security testing lab on Proxmox: - Multiple VMs running Kali, Parrot, REMnux for different security disciplines - Isolated network segments for malware analysis and exploitation practice - Detection engineering pipeline: attack simulation, log collection, rule writing - **Tech:** Proxmox, pfSense, ELK Stack, Docker
  3. Security Writeups

    2026-Present

    fritz-the-cat.co.uk

    Publishing security research and analysis: - CVE analysis with MITRE ATT&CK mapping and detection opportunities - TryHackMe room walkthroughs with methodology documentation - Security tool reviews and comparison guides - **Impact:** Building a public portfolio of security knowledge

Professional Experience
#

  1. Bars Manager

    2018-Present

    Bistrotheque, London

    Managing high-volume operations in one of London's busiest venues. **Why this matters for security:** - **Incident management** — handling crises in real-time with incomplete information, coordinating team response - **Operational discipline** — running complex systems where failure has immediate consequences - **Team leadership** — managing 12+ people under pressure, training, mentoring - **Resource optimisation** — reducing waste by 30% through data-driven inventory systems **Tech projects built on the side:** - Automated scheduling system (Python) - Sales analytics dashboard - Inventory tracking system
  2. Senior Repair Technician

    2016-2018

    Minko's Macs, London

    Promoted from entry to senior in 4 weeks. Diagnosed and repaired 300+ devices monthly. - 95% first-time fix rate through systematic troubleshooting - Implemented secure data recovery protocols - Trained 5 junior technicians in hardware diagnostics - **Skills:** Hardware forensics, data recovery, systematic debugging
  3. International Experience

    2013-2016

    London, Sydney, Paris

    Worked across three continents while self-teaching programming and security: - Self-taught Python, C, and networking fundamentals - Completed 100+ hours of online security courses - Built first home lab in a Sydney sharehouse - Foundation for cybersecurity degree decision

Education & Certifications
#

  1. BSc (Hons) Cyber Security and Computer Forensics

    2018-2021

    University of Greenwich, London — 2:1

    **Core Modules:** Cryptography, Penetration Testing, Digital Forensics, Network Security, Malware Analysis **Dissertation:** *Automated Threat Detection in Containerized Environments* - Developed Python-based monitoring system for Docker containers - Achieved 15% better threat detection than commercial solutions in controlled tests
  2. Certifications

    Ongoing

    Continuous Learning

    **Completed:** - Google Cybersecurity Professional Certificate (2024) - TryHackMe learning paths (Penetration Testing, SOC Analyst) **In Progress:** - CompTIA Security+ (target Q2 2026)

What Makes Me Different
#

Non-traditional path, real-world pressure management, technical depth plus human skills. I’ve managed crises at 2 AM in a packed bar and debugged production systems at 3 AM. Both require patience, systematic thinking, and composure under pressure. I bring security expertise combined with proven leadership and communication skills that most junior engineers don’t have.

Contact
#

Open to: Security Engineering, SOC Analyst, Detection Engineering, and DFIR roles in London or remote UK.

Last updated: March 2026