CV
Professional Career

As a Cyber Defense Associate at one of Europe’s largest tech companies, I supported both offensive and defensive cybersecurity teams. I contributed to Bug Bounty, Penetration Testing, and Red Teaming efforts, as well as Cyber Threat Intelligence and Threat Hunting. I led penetration tests, discovered vulnerabilities in major cloud applications, developed automation solutions, and spent six months at our US headquarters.
- Performed penetration tests on web applications and cloud backends, identifying vulnerabilities
- Automated bug bounty analysis with Python, Jupyter, PowerBI, and generative AI
- Developed a comprehensive web security knowledge base for bug bounty coordinators and developers
- Built and maintained a dedicated web application penetration testing lab

During my Offensive Security internship, I conducted penetration tests to identify vulnerabilities in infrastructure and applications. I also performed detailed white-box assessments by reviewing source code for high-availability banking systems.
- Web application and infrastructure penetration testing
- Built a Python CLI tool to automate vulnerability scans, integrating Nmap results

In my role as a working student at a Cyber Security Operations Center, I audited Python code for SIEM detection rules and automated routine tasks using Python tools. I conducted malware analyses, investigated security incidents, and performed technical assessments. Additionally, I enhanced SOC processes by creating tools that aggregate and summarize data from various cyber threat intelligence sources.
- Developed SIEM detection rules to enhance threat response
- Audited SIEM Python code to resolve inefficiencies
- Automated SOC tasks with Python to boost efficiency
- Conducted malware analyses to identify malicious behavior
- Investigated security incidents and provided technical insights
- Executed in-depth technical cybersecurity analyses
- Streamlined SOC processes to improve response times

As a working student, I played a key role in the rollout of Windows 10 and Office 365, provided comprehensive user support, and managed the ordering of hardware and software. My responsibilities also included handling backups and administering user accounts.
- Executed a Windows 10 and Office 365 rollout
- Delivered technical support
- Procured hardware and software
- Administered backups

As a working student, I administered users in Microsoft Active Directory and managed smartphones using VMware AirWatch. My responsibilities included maintaining switches and cabling, overseeing daily backup jobs, and performing computer and software installations with Microsoft SCCM. Additionally, I provided 1st and 2nd level support and coordinated Windows 10 and Office 365 rollouts.
- Oversaw user administration in Active Directory
- Administered smartphones using VMware AirWatch
- Packaged software
- Coordinated hardware and software orders
- Maintained switches, cabling, and IT infrastructure
- Managed daily backups

As an IT Specialist for System Integration, I ensured the security of mobile devices by installing and managing BlackBerry UEM. I administered the Microsoft Active Directory and Exchange Server, maintained IT infrastructure, and provided 1st and 2nd level technical support. Additionally, I handled antivirus alerts, removed malware from clients, managed workspaces and maintained the time tracking system.
- Addressed TrendMicro Malware alerts
- Led the migration from BES5 to Android Enterprise on BlackBerry UEM
- Maintained Active Directory, Exchange server, and virtual desktop environment
- Preserved switches and cabling
- Oversaw the administration of the time tracking system
- 1st and 2nd level support

During a one-year internship as part of technical secondary school, I provided 1st level support through a telephone hotline and documented issues in a helpdesk tool. My role included 2nd level on-site support, installing printers and software, troubleshooting, setting up and installing IT equipment, and inventorying IT equipment.
- Offered technical support (1st & 2nd level)
- Documented incidents in the Helpdesk-Tool
- Installed printers and software
- Set up and configured IT equipment
- Conducted IT hardware inventory
Academic Career / School Education

- Thesis topic: Creating a penetration testing methodology for IoT devices (Grade: 1.2/1)

- Network technologies
- Client server systems
- Firewalls
- Signaling technology
- Object oriented programming (Java)
- Databases (SQL)
- Electrical engineering
- Data protection
- Accounting and controlling
- Business processes
- Marketing
- Market research
- Customer analysis
- Project management

- Electrical engineering
- IT systems
- Network technologies
- Databases (SQL)
- Object oriented programming (C++)