Security Profile
▶ Elite cybersecurity and cryptography specialist with 4+ years of expertise in hardening distributed systems and blockchain security.
Cryptography
Expert in post-quantum cryptography and blockchain security protocols
System Security
Specialized in securing high-performance distributed systems
Compliance
Deep knowledge of GDPR and security standards implementation
Security Operations History
Applied Cryptography Engineer
OpenZeppelin | Remote, Austria
Aug 2023 – Apr 2024
- ▶ Designed cryptographic protocols to enhance the security of blockchain-based financial transactions, increasing system resilience to attacks by 30%.
- ▶ Integrated post-quantum cryptographic algorithms to protect decentralized systems from emerging quantum threats.
- ▶ Conducted penetration testing and security audits, ensuring compliance with GDPR and other data security standards.
- ▶ Optimized cryptographic modules, boosting blockchain network performance by 25%.
Middle Rust Engineer
NextGen Technologies | Remote, Italy
Jul 2022 – Jul 2023
- ▶ Developed secure distributed systems capable of handling over 1 million requests per second.
- ▶ Implemented cryptographic solutions for blockchain applications, reducing attack surfaces and processing delays by 15%.
- ▶ Conducted security testing for performance-critical modules, enhancing overall system security by 20%.
Security Projects
Rootkit Detector →
Advanced security tool for detecting and analyzing rootkit presence in Linux systems, utilizing kernel-level monitoring and behavioral analysis.
Consensus Algorithms EDU →
Educational implementation of distributed consensus algorithms, focusing on security aspects and Byzantine fault tolerance.
Blockchain Anomaly Detection →
Machine learning-based system for detecting suspicious patterns and potential security threats in blockchain networks.
Security Arsenal
Programming Languages
- ▶ Rust (90%)
- ▶ C++ (85%)
- ▶ C (99%)
- ▶ Python (85%)
- ▶ Java (80%)
Security Expertise
- ▶ Cryptographic Protocols (AES, RSA, ECC, Post-Quantum)
- ▶ GDPR Compliance
- ▶ Penetration Testing
- ▶ Secure SDLC
- ▶ Threat Modeling
Security Tools
- ▶ Wireshark
- ▶ Metasploit
- ▶ Burp Suite
- ▶ GDB
- ▶ Docker
- ▶ Kubernetes