About Me
Hey there! I'm a backend developer and security engineer in Queens, NY. I specialize in building scalable APIs and microservices with comprehensive security testing.
Creating robust backend systems that scale and protect your business.
The Beginning
Started with gaming communities at 14, where I discovered cybersecurity through real-world threats.
Current Focus
Blending offensive security with secure development to build comprehensive protection.
Education
Computer Science at Queens College with focus on security research and development.
Technical Expertise
Security Methodology & Approach
My comprehensive approach to cybersecurity combines ethical practices, technical expertise, and continuous innovation
When I do penetration testing, I follow a careful, ethical approach that's like real attacks but done safely. I believe in thorough research, finding problems step by step, and always reporting issues responsibly.
Whether I'm testing networks or web apps, I use both automated tools and hands-on techniques to find problems that scanners might miss. My reports don't just point out issues they give you clear steps to fix things and help you understand what to tackle first.
As a backend developer who knows security, I build safety right into the design from the start. I focus on writing secure code, thinking about what could go wrong, and having multiple layers of protection.
Whether I'm making APIs with strong login systems or securing databases, I make sure every piece is protected against common attacks. My code gets thorough security checks and testing to keep everything as strong as possible.
As a security researcher, I try to stay ahead of new threats and find new ways attackers might strike. I regularly look at new vulnerabilities, study malware trends, and play with the latest security tools.
Whether I'm taking apart suspicious files or studying network traffic, I approach each project carefully and document everything. I share what I find with the security community in a responsible way so everyone can learn and stay safer.
Cybersecurity never stops changing, so I never stop learning. I stay active in security communities, go to conferences (both online and in person), and work on getting certifications to keep up with the latest best practices and new tech.
I keep my skills sharp through hands-on lab work, capture-the-flag competitions, and working with other security pros. This helps me stay on top of our fast-changing world of threats and make sure I can always help protect what matters.
Core Security Competencies
- • Web Application Security Testing
- • Network Infrastructure Assessment
- • API Security Evaluation
- • Mobile Application Testing
- • Cloud Security Configuration Review
- • Social Engineering Assessment
- • Secure API Design & Implementation
- • Authentication & Authorization Systems
- • Database Security & Encryption
- • Input Validation & Sanitization
- • Security Code Review
- • DevSecOps Integration
- • Firewall Configuration & Management
- • DDoS Protection Implementation
- • Linux System Hardening
- • Container Security (Docker/K8s)
- • AWS Security Best Practices
- • Network Monitoring & IDS/IPS
The Gaming Origins
My cybersecurity journey began in competitive gaming, where I saw the impact of digital harassment and network attacks. This curiosity led me to explore network protocols, system vulnerabilities, and digital forensics.
The Security Philosophy
True security mastery means thinking as both defender and ethical attacker. This dual view shapes my penetration testing methodology, balancing user needs and admin challenges for better solutions.
The Impact Today
I now apply these insights to enterprise security projects, helping organizations build practical defenses. My journey shows how curiosity and commitment can grow into expertise that makes the digital world safer.
Education
Ready to Strengthen Your Security Posture?
Let's build stronger digital defenses together
Penetration Testing
Security assessments & recommendations
Secure Development
Security-first backend systems
Security Research
Threat analysis & prevention