Durok.
I like to think laterally.
Fueled by curiosity, compiled with passion, and executed with precision.
Fueled by curiosity, compiled with passion, and executed with precision.

Cyber Security guy with a thing for researching threats, breaking things ethically, and automating whatever feels repetitive. I get completely absorbed when something sparks my curiosity and I enjoy going deep until I figure it out. In my spare time I tinker with code, stay loyal to Bitcoin, and love working with sharp minds in collaborative environments.
if (vibes == "good" && hacks == "clean") then passion ❤️
Red/Blue Team ActivitiesDFIR (Digital Forensics and Incident Response)CTI (Cyber Threat Intelligence)Research and DevelopmentDevSecOps (Development, Security, and Operations)Scripting, Automation, and ToolingActively involved in both offensive and defensive activities, with participation in international events. Work includes advanced threat simulation, incident response, and the research and development of new tools and techniques to support cyber activities and resilience.
Key responsibilities:
Participation in multinational eventsOffensive activities: vulnerability research, exploitation, C2 setup, and adversary emulationDefensive activities: log analysis, detection engineering, SIEM/EDR tuning, and responseSystem hardening and secure architecture deployment in realistic operational scenariosResearch & development of custom scripts, tools, and procedures for attack/defense workflowsContribution to threat intelligence production and use-case developmentDocumentation of findings, technical reports, and lessons learnedManaged and maintained mission-critical communication infrastructures, including terrestrial, and satellite systems. Delivered end-to-end IT support, from network deployment to domain and system administration, ensuring stable and secure operations.
Key responsibilities:
Configuration, installation, and alignment of radio and satellite communication linksSetup and maintenance of LAN/WAN infrastructures and telephony systemsInstallation and administration of Windows-based IT systems and services (AD, DNS, DHCP)Troubleshooting and maintaining network connectivity in remote or constrained environmentsManagement of domain controllers and authentication servicesIntegration of communication systems with existing IT infrastructureDocumentation of configurations and procedures for operational continuity




