____ _ _ _ _ _
/ ___| ___ ___ _ __ __ _ ___ | \ | | __ _ __| | ___ (_) __| | ___
| | _ / _ \/ _ \| '__/ _` |/ _ \ | \| |/ _` |/ _` |/ _ \| |/ _` |/ _ \
| |_| | __/ (_) | | | (_| | __/ | |\ | (_| | (_| | __/| | (_| | __/
\____|\___|\___/|_| \__, |\___| |_| \_|\__,_|\__,_|\___|/ |\__,_|\___|
|___/ |__/
Cyber Security Professional
"Protecting the Digital World — One System at a Time"
location Nijmegen, Netherlands
status OPEN TO OPPORTUNITIES
current MSc Cyber Security @ Radboud University
Diligent and ambitious cyber security professional eager to learn how systems work and interact with each other. I tackle challenges with curiosity and a problem-solving mindset, continuously seeking innovative solutions and growth opportunities.
My passion for cyber security inspires me to explore new ways of securing our digital environment through platforms such as TryHackMe and Hack The Box.
I'm now looking for my next challenge — waiting impatiently to hack my way into a new role where I can prove my skills and knowledge.
Investigated what relevant digital information is left in vehicle infotainment systems as a result of using Android Auto or Apple CarPlay. Combined automotive security knowledge with forensic analysis techniques.
Appointed by course coordinators to conduct weekly working groups, grade assignments and provide constructive feedback. Supported students across a wide range of computer science courses.
Designed and improved the Edufort's SIEM tool and privacy portal using Symfony and PHP, adhering to SCRUM principles. Responsible for Continuous Integration via GitHub Actions and implementing a dynamic dashboard connecting front-end data graphs to the database — enabling real-time, interactive visualizations of each user's privacy situation.
Expertise in deck function primitives, post-quantum cryptanalysis, and secure protocol implementation (IPSec/TLS).
Static and dynamic analysis of binaries, firmware, and mobile applications. Digital forensics of embedded and automotive systems.
Network and web application security testing, vulnerability research, and offensive tooling.
Systems and scripting languages used across security research, tool development, and academic work.
Side channel analysis, fault injection, embedded systems analysis and hardware-level attack surfaces.
Software engineering tools and workflows used in academic projects and professional internships.
Hands-on introduction to dynamic instrumentation using Frida — hooking functions, inspecting memory, and reverse engineering mobile and desktop applications.
A structured introduction to core cyber security domains — networking, Linux, web security, and defensive techniques.
Foundational cyber security concepts, tools and techniques.
Entry-level overview of the cyber security landscape, covering common attack types, career paths, and essential defensive concepts.
Foundational command-line skills and core knowledge of the Linux operating system.
Broad introduction to AI concepts, applications, and societal implications — covering machine learning, neural networks, and AI ethics.
A collection of hands-on security work — CTF writeups, lab walkthroughs, and research notes organised by platform. Each entry documents my methodology, tools used, and key takeaways.
Room walkthroughs covering web exploitation, privilege escalation, forensics, reverse engineering and more. Each writeup documents the full attack chain with annotated screenshots.
Writeups from HTB, covering network security, active directory attacks, and web application penetration testing fundamentals.
Writeups for OverTheWire's Bandit wargame — a Linux command-line challenge series.
Implementations of CPA, Template Attacks on AES and Ed25519, Differential Fault Analysis on AES, and TVLA leakage assessment on masked implementations.
Optimized AprèsSQI — a NIST candidate for post-quantum signature standardization, by designing a more precise cost model for verification.
I'm actively looking for new opportunities in cyber security. Whether you have a position, a project, or just want to connect — my inbox is always open.