Principal Security Engineer focused on application security, C++ security tooling, Windows internals, and offensive security engineering.
I build and document lab-oriented security tools to explore how offensive mechanisms work under the hood: loader internals, C2 architecture, security tooling design tradeoffs, application security, Kubernetes/OpenShift security modeling, and security automation.
My public work is intended for authorized research, education, and controlled lab environments.
- Offensive security engineering
- C++ tooling for security research
- Windows internals and PE loading mechanisms
- Application security and secure code review
- C2 architecture and operator/tooling workflows
- Kubernetes/OpenShift security modeling
- Agentic AI for security tooling and research workflows
- LLM-assisted development and security automation
- DreamWalkers — lab research around Windows loader internals, PE loading, stack artifacts, and execution tradeoffs.
- Exploration C2 — educational C2 architecture project for studying teamserver, client, listener, and agent design.
- Technical blog — engineering notes and security research.
- Kubernetes/OpenShift security research — graph-based approaches to understanding RBAC, SCC, service accounts, routes, and attack paths.
The views, research, and content shared here are my own and do not represent, reflect, or speak for my employer.
All content is published for authorized security research, education, and controlled lab environments only.



