Security engineer with a cybersecurity degree, AI/automation expertise, and 10+ years of leadership in high-pressure environments. Building at the intersection of security and AI.
Core Competencies#
Incident Response DFIR Detection Engineering SIEM Cloud Security AI Security Threat Hunting
- Security Engineering — penetration testing, digital forensics, cryptography, detection rule writing
- Infrastructure Automation — Cloudflare Workers, Docker, CI/CD, AI agent pipelines
- AI Integration — LLM-powered security automation, prompt injection testing, MCP protocol
- Communication — technical writing, incident reporting, cross-team coordination
- Languages — English, Italian, French fluent; Python, TypeScript, Bash, C
Technical Skills#
| Category | Technologies |
|---|---|
| Security Tools | Nmap, Burp Suite, Wireshark, Metasploit, Volatility, Autopsy |
| SIEM / Detection | Sigma rules, YARA, ELK Stack, Splunk (learning) |
| Languages | Python, TypeScript, Bash, C, SQL |
| Infrastructure | Docker, Kubernetes, Proxmox, Linux (Debian/Arch), Cloudflare Workers |
| Cloud | AWS, Cloudflare, Digital Ocean |
| Automation | Custom AI pipelines, GitHub Actions, Ansible |
| Databases | PostgreSQL, Redis, MongoDB |
Projects#
PAI — Personal AI Infrastructure
2025-Present
AI Agent Security Automation
Built a comprehensive AI infrastructure system that automates security workflows: - 10 Cloudflare Workers handling daily security news, CVE monitoring, TryHackMe tracking, and study automation - Custom LLM pipelines for security content analysis and writeup generation - Event-driven architecture with Discord notifications and scheduled cron triggers - **Tech:** TypeScript, Cloudflare Workers, Anthropic API, Discord webhooksHome Lab
2023-Present
Security Testing Environment
Designed and maintain a security testing lab on Proxmox: - Multiple VMs running Kali, Parrot, REMnux for different security disciplines - Isolated network segments for malware analysis and exploitation practice - Detection engineering pipeline: attack simulation, log collection, rule writing - **Tech:** Proxmox, pfSense, ELK Stack, DockerSecurity Writeups
2026-Present
fritz-the-cat.co.uk
Publishing security research and analysis: - CVE analysis with MITRE ATT&CK mapping and detection opportunities - TryHackMe room walkthroughs with methodology documentation - Security tool reviews and comparison guides - **Impact:** Building a public portfolio of security knowledge
Professional Experience#
Bars Manager
2018-Present
Bistrotheque, London
Managing high-volume operations in one of London's busiest venues. **Why this matters for security:** - **Incident management** — handling crises in real-time with incomplete information, coordinating team response - **Operational discipline** — running complex systems where failure has immediate consequences - **Team leadership** — managing 12+ people under pressure, training, mentoring - **Resource optimisation** — reducing waste by 30% through data-driven inventory systems **Tech projects built on the side:** - Automated scheduling system (Python) - Sales analytics dashboard - Inventory tracking systemSenior Repair Technician
2016-2018
Minko's Macs, London
Promoted from entry to senior in 4 weeks. Diagnosed and repaired 300+ devices monthly. - 95% first-time fix rate through systematic troubleshooting - Implemented secure data recovery protocols - Trained 5 junior technicians in hardware diagnostics - **Skills:** Hardware forensics, data recovery, systematic debuggingInternational Experience
2013-2016
London, Sydney, Paris
Worked across three continents while self-teaching programming and security: - Self-taught Python, C, and networking fundamentals - Completed 100+ hours of online security courses - Built first home lab in a Sydney sharehouse - Foundation for cybersecurity degree decision
Education & Certifications#
BSc (Hons) Cyber Security and Computer Forensics
2018-2021
University of Greenwich, London — 2:1
**Core Modules:** Cryptography, Penetration Testing, Digital Forensics, Network Security, Malware Analysis **Dissertation:** *Automated Threat Detection in Containerized Environments* - Developed Python-based monitoring system for Docker containers - Achieved 15% better threat detection than commercial solutions in controlled testsCertifications
Ongoing
Continuous Learning
**Completed:** - Google Cybersecurity Professional Certificate (2024) - TryHackMe learning paths (Penetration Testing, SOC Analyst) **In Progress:** - CompTIA Security+ (target Q2 2026)
What Makes Me Different#
Non-traditional path, real-world pressure management, technical depth plus human skills. I’ve managed crises at 2 AM in a packed bar and debugged production systems at 3 AM. Both require patience, systematic thinking, and composure under pressure. I bring security expertise combined with proven leadership and communication skills that most junior engineers don’t have.
Contact#
- Email: firezer.zanasi@outlook.com
- Location: London, UK (EU citizen, UK settled status)
- GitHub: github.com/fzzzz1
- Blog: fritz-the-cat.co.uk
- LinkedIn: linkedin.com/in/firezer-zanasi
Open to: Security Engineering, SOC Analyst, Detection Engineering, and DFIR roles in London or remote UK.
Last updated: March 2026

