This commit is contained in:
parent
d36b45653d
commit
a4c225d0d0
@ -9,25 +9,27 @@ on:
|
||||
jobs:
|
||||
build-pdf:
|
||||
runs-on: ubuntu-latest
|
||||
container:
|
||||
image: ghcr.io/renovatebot/renovate:latest
|
||||
|
||||
container: texlive/texlive:latest
|
||||
|
||||
steps:
|
||||
- name: Install node :(
|
||||
run: |
|
||||
apt update -y
|
||||
apt install -y npm
|
||||
|
||||
- name: Checkout repository
|
||||
uses: actions/checkout@v4
|
||||
|
||||
- uses: xu-cheng/latex-action@v4
|
||||
with:
|
||||
root_file: |
|
||||
main.tex
|
||||
|
||||
|
||||
- name: Build PDF
|
||||
run: make pdf
|
||||
|
||||
- name: Upload PDF artifact
|
||||
uses: actions/upload-artifact@v3
|
||||
with:
|
||||
name: curriculum-vitae
|
||||
path: main.pdf
|
||||
retention-days: 30
|
||||
|
||||
|
||||
- name: Deploy to pdf-artifacts branch
|
||||
if: github.ref == 'refs/heads/main'
|
||||
run: |
|
||||
|
||||
156
main.tex
156
main.tex
@ -1,57 +1,125 @@
|
||||
\documentclass[11pt]{article}
|
||||
\usepackage[letterpaper,
|
||||
top=0.5in,
|
||||
bottom=0.5in,
|
||||
left=0.5in,
|
||||
right=0.5in]{geometry}
|
||||
|
||||
\documentclass[letterpaper,11pt]{article}
|
||||
|
||||
% Choose bibliography style for formatting list of publications
|
||||
% Reduce page margins
|
||||
\usepackage[margin=0.3in]{geometry}
|
||||
\usepackage[style=ieee,url=false,doi=false,maxbibnames=99,sorting=ydnt,dashed=false]{biblatex}
|
||||
\usepackage{enumitem}
|
||||
\usepackage{multicol}
|
||||
\usepackage{XCharter}
|
||||
\usepackage[T1]{fontenc}
|
||||
\usepackage[utf8]{inputenc}
|
||||
\usepackage{enumitem}
|
||||
\usepackage[hidelinks]{hyperref}
|
||||
\usepackage{titlesec}
|
||||
\usepackage{xcolor}
|
||||
\usepackage{graphicx}
|
||||
\raggedright
|
||||
\pagestyle{empty}
|
||||
|
||||
\bibliography{papers}
|
||||
\input{glyphtounicode}
|
||||
\pdfgentounicode=1
|
||||
|
||||
% More predefined colors can be found in
|
||||
% https://en.wikibooks.org/wiki/LaTeX/Colors
|
||||
% Example photograph taken from Wikimedia Commons
|
||||
% https://commons.wikimedia.org/wiki/File:Kiara_Krit_passport.jpg
|
||||
\def\theme{RoyalBlue}
|
||||
% Define professional colors
|
||||
\definecolor{headerblue}{RGB}{25, 25, 112}
|
||||
\definecolor{accentblue}{RGB}{70, 130, 180}
|
||||
\definecolor{darkgray}{RGB}{64, 64, 64}
|
||||
|
||||
\pagenumbering{gobble}
|
||||
\setlist{nolistsep}
|
||||
\nointerlineskip
|
||||
% Enhanced section formatting with color
|
||||
\titleformat{\section}{\color{headerblue}\bfseries\large}{}{0pt}{}[\vspace{1pt}{\color{accentblue}\titlerule}\vspace{-6.5pt}]
|
||||
|
||||
\renewcommand\labelitemi{$\vcenter{\hbox{\small\color{accentblue}$\bullet$}}$}
|
||||
\setlist[itemize]{itemsep=-2pt, leftmargin=12pt, topsep=7pt}
|
||||
|
||||
\usepackage{simplecv}
|
||||
|
||||
\boldname{Surname}{Name}{N.}
|
||||
|
||||
\titlespacing*{\section}
|
||||
{0pt}{0pt}{10pt}
|
||||
% Custom command for highlighting key achievements
|
||||
\newcommand{\highlight}[1]{\textbf{\color{darkgray}#1}}
|
||||
|
||||
\begin{document}
|
||||
|
||||
% Heading
|
||||
\headinginline{Yiğit Çolakoğlu}{
|
||||
Email: \email{root@yigit.run} \\
|
||||
Website: \website{yigit.run} \\
|
||||
GitHub: \github{arg3t} \\
|
||||
}
|
||||
% Name with enhanced styling
|
||||
\centerline{\Huge\color{headerblue}\textbf{Yiğit Çolakoğlu}}
|
||||
|
||||
% Page One
|
||||
\vspace{5pt}
|
||||
|
||||
% Contact Information with subtle styling
|
||||
\centerline{\color{darkgray}root@yigit.run | yigit.run | github.com/arg3t}
|
||||
|
||||
\vspace{-10pt}
|
||||
|
||||
% Education
|
||||
\section*{Education}
|
||||
\textbf{TU Delft} -- MSc in Computer Science (Cyber Security \& Distributed Systems) \hfill Sept 2024 -- Present \\
|
||||
\textbf{TU Delft} -- BSc in Computer Science and Engineering, \textit{\color{accentblue}Cum Laude} (\highlight{8.1/10}) \hfill Sept 2021 -- June 2024
|
||||
|
||||
\vspace{-6.5pt}
|
||||
|
||||
% Experience
|
||||
\section*{Experience}
|
||||
\textbf{Developer \& Offensive Cyber Threat Intelligence Analyst,} PRODAFT -- Den Haag, NL \hfill Sept 2022 -- Present
|
||||
\vspace{-9pt}
|
||||
\begin{itemize}
|
||||
\item Maintain OSS threat intelligence correlation platform (CRADLE) processing \highlight{15,000+ weekly artifacts} from 5 data sources, reducing analysis time by \highlight{45\%}
|
||||
\item Lead team of \highlight{5 engineers} developing open source threat intelligence platform CRADLE with \highlight{200+ GitHub stars}
|
||||
\item Implemented graph-based correlation algorithms (PageRank, risk propagation) in Neo4j for threat classification across \highlight{1M+ nodes}
|
||||
\item Automated \highlight{8 manual threat intelligence workflows} using Python, saving \highlight{20 hours weekly}
|
||||
\item Conducted threat hunting operations, authoring \highlight{2 published reports} and presenting at ONE Security Summit
|
||||
\end{itemize}
|
||||
|
||||
\textbf{Teaching Assistant,} TU Delft -- Delft, NL \hfill Sept 2022 -- Present
|
||||
\vspace{-9pt}
|
||||
\begin{itemize}
|
||||
\item Instructed \highlight{500+ students} across \highlight{6 computer science courses} including Computer Organization, Distributed Systems, and Embedded Software
|
||||
\end{itemize}
|
||||
|
||||
\textbf{Digital Forensics Automation Developer Intern,} Police Department -- Rotterdam, NL \hfill Apr 2023 -- July 2023
|
||||
\vspace{-9pt}
|
||||
\begin{itemize}
|
||||
\item Developed Python-based forensic tool detecting encrypted containers in \highlight{5TB+ evidence files}, eliminating manual analysis tasks
|
||||
\item Automated field data extraction from desktop devices allowing officers to quickly acquire data from live systems with minimal training
|
||||
\end{itemize}
|
||||
|
||||
\vspace{-18.5pt}
|
||||
|
||||
% Projects
|
||||
\section*{Projects}
|
||||
\textbf{CTF Challenge Designer \& Organizer} \hfill ctf.ewi.tudelft.nl
|
||||
\vspace{-9pt}
|
||||
\begin{itemize}
|
||||
\item Organized \highlight{2 CTF competitions} with \highlight{300+ participants}, TU Delft's largest CTF event
|
||||
\item Designed \highlight{5 CTF challenges} ranging from web exploitation to binary/kernel exploitation
|
||||
\end{itemize}
|
||||
|
||||
\textbf{Tilikum -- DAG-based Consensus Protocol with Fair Ordering} \hfill
|
||||
\vspace{-9pt}
|
||||
\begin{itemize}
|
||||
\item Developed fair-ordering algorithm preventing MEV attacks using ordering linearizability and batch-order-fairness
|
||||
\item Optimized BFT consensus achieving \highlight{12,000 tx/s throughput} with \highlight{<2s latency}, major improvement for fair ordering protocols
|
||||
\end{itemize}
|
||||
|
||||
\textbf{LLVM Fence Optimization -- Memory Ordering Optimization} \hfill github.com/arg3t/cs4560\_fencing
|
||||
\vspace{-9pt}
|
||||
\begin{itemize}
|
||||
\item Implemented LLVM pass optimizing fence placement in concurrent programs using min-cut max-flow algorithm
|
||||
\item Fully eliminate unnecessary fences in LLVM programs while ensuring memory consistency
|
||||
\end{itemize}
|
||||
|
||||
\textbf{Sanctum -- Process-Bound Disk Encryption} \hfill github.com/arg3t/sanctum
|
||||
\vspace{-9pt}
|
||||
\begin{itemize}
|
||||
\item Developed Linux kernel module enabling transparent per-process encryption with \highlight{<5\% performance overhead}
|
||||
\end{itemize}
|
||||
|
||||
\textbf{massurl -- High-Performance URL Reconnaissance Tool} \hfill github.com/arg3t/massurl
|
||||
\vspace{-9pt}
|
||||
\begin{itemize}
|
||||
\item Built URL aggregator processing \highlight{250K+ URLs/second}
|
||||
\end{itemize}
|
||||
|
||||
\vspace{-18.5pt}
|
||||
|
||||
% Skills with enhanced formatting
|
||||
\section*{Skills}
|
||||
\textbf{Languages:} Python, C, Rust, Go, Java, JavaScript, Bash \\
|
||||
\textbf{Technologies:} Django, Neo4j, Linux Kernel, Docker, Kubernetes, Git, PostgreSQL, React, Qt, Tokio \\
|
||||
\textbf{Security:} Penetration Testing, Threat Intelligence, Binary Exploitation, Byzantine Consensus, Concurrency \\
|
||||
|
||||
\vspace{0.5em}
|
||||
% \import{sections/}{profile.tex}
|
||||
\import{sections/}{education.tex}
|
||||
\vspace{0.05em}
|
||||
\import{sections/}{experience.tex}
|
||||
\vspace{0.05em}
|
||||
\import{sections/}{projects.tex}
|
||||
\vspace{0.05em}
|
||||
\import{sections/}{awards.tex}
|
||||
\vspace{0.05em}
|
||||
\import{sections/}{skills.tex}
|
||||
% Page Two
|
||||
% \import{sections/}{activities.tex}
|
||||
% \import{sections/}{languages.tex}
|
||||
\end{document}
|
||||
|
||||
@ -1,42 +1,28 @@
|
||||
|
||||
\section{Experience}
|
||||
|
||||
\outerlist{
|
||||
|
||||
\entrybig
|
||||
{\textbf{PRODAFT}}{\textit{ Den Haag, NL }}
|
||||
{\textit{ Developer \& Offensive Cyber Threat Intelligence Analyst }}{\textit{ September 2022 - Present }}
|
||||
{\textbf{PRODAFT}}{Den Haag, NL}
|
||||
{Developer \& Offensive Cyber Threat Intelligence Analyst}{Sept 2022 – Present}
|
||||
\innerlist{
|
||||
\entry{Working on a threat intelligence correlation platform (CRADLE) to aggregate artifacts from data sources with high throughput.}
|
||||
\entry{Development and implementation of graph-based algorithms using Neo4J: PageRank, Recommendation, Explainable AI, Risk Prediction.}
|
||||
\entry{Internal tool development for automating TI tasks, management of team members and collaborative knowledge management.}
|
||||
\entry{Proactive threat hunting and penetration testing}
|
||||
\entry{Maintain the OSS threat intelligence correlation platform (CRADLE) processing 15000+ weekly artifacts from 5 data sources, reducing analysis time by 45\%}
|
||||
\entry{Lead a team of 5 engineers to develop the open source threat intelligence platform CRADLE, with 200+ stars on GitHub}
|
||||
\entry{Implemented graph-based correlation algorithms (PageRank, risk propagation) in Neo4j for threat classification and propagation across 1M+ nodes}
|
||||
\entry{Automated 8 manual threat intelligence workflows using Python, saving 20 hours weekly}
|
||||
\entry{Conducted threat hunting operations, writing and releasing 2 reports and giving a talk in the ONE Security Security Summit 2024}
|
||||
}
|
||||
|
||||
\vspace{0.2em}
|
||||
|
||||
\entrybig
|
||||
{\textbf{TU Delft}}{\textit{ Delft, NL }}
|
||||
{\textit{ Teaching Assistant }}{\textit{ September 2022 - Present }}
|
||||
{\textbf{TU Delft}}{Delft, NL}
|
||||
{Teaching Assistant}{Sept 2022 – Present}
|
||||
\innerlist{
|
||||
\entry{Assisted in the teaching of the courses OOP, Computer Organization, Database Technologies, Embedded Software, Distributed Systems, Software Project.}
|
||||
\entry{Instructed 500+ students across 6 computer science courses including Computer Organisation, Distributed Systems, and Embedded Software}
|
||||
}
|
||||
|
||||
\vspace{0.2em}
|
||||
|
||||
\entrybig
|
||||
{\textbf{Rotterdam Police Department}}{\textit{ Rotterdam, NL }}
|
||||
{\textit{ Intern at Team Zeden and TBKK }}{\textit{ April 2023 - July 2023 }}
|
||||
{\textbf{Rotterdam Police Department}}{Rotterdam, NL}
|
||||
{Digital Forensics Automation Developer Intern}{Apr 2023 – July 2023}
|
||||
\innerlist{
|
||||
\entry{Worked on the development of an internal tool used for detection of encrypted containers in a live system or forensic evidence files.}
|
||||
}
|
||||
|
||||
\vspace{0.2em}
|
||||
|
||||
\entrybig
|
||||
{\textbf{ASELSAN}}{\textit{ Ankara, TR }}
|
||||
{\textit{ Intern at Software and Hardware Design }}{\textit{ January 2020 - February 2020 }}
|
||||
\innerlist{
|
||||
\entry{Designed and produced a simple timing circuit \\ Learned the basics of FPGA design and developed a simple FPGA project using VHDL. }
|
||||
\entry{Developed Python-based forensic tool detecting encrypted containers in 5TB+ evidence files, fully eliminating manual analysis tasks}
|
||||
}
|
||||
}
|
||||
|
||||
@ -1,70 +1,33 @@
|
||||
\section{Projects}
|
||||
|
||||
\begin{minipage}[t]{0.48\textwidth}
|
||||
\outerlist{
|
||||
\entrybig[\textbullet]
|
||||
{\textbf{Tilikum} \textit{(Rust/Tokio, 2025)}}{}
|
||||
{DAG-based fair-ordering atop Narwhal/Tusk}{}
|
||||
\entrybig
|
||||
{\textbf{Tilikum} – DAG-based Consensus Protocol with Fair Ordering}{github.com/arg3t/tilikum}
|
||||
{Rust, Tokio}{2024 – 2025}
|
||||
\innerlist{
|
||||
\entry{Developed fair-ordering algorithm preventing MEV attacks using ordering linearizability and batch-order-fairness}
|
||||
\entry{Optimized the BFT Consensus mechanism to achieve 12000 tx/s throughput with <2s latency (big improvement for fair ordering protocols)}
|
||||
}
|
||||
\end{minipage}
|
||||
\begin{minipage}[t]{0.505\textwidth}
|
||||
\outerlist{
|
||||
\entrybig[\textbullet]
|
||||
{\textbf{BlueBell} \textit{(C/Linux Kernel, 2025)}}{}
|
||||
{WIP. Please reach out for details.}{}
|
||||
\vspace{0.2em}
|
||||
\entrybig
|
||||
{\textbf{Sanctum} – Process-Bound Full Disk Encryption}{github.com/arg3t/sanctum}
|
||||
{C, Linux Kernel}{2024}
|
||||
\innerlist{
|
||||
\entry{Developed kernel module enabling transparent per-process encryption to achieve complete data confidentiality in multi-user systems}
|
||||
}
|
||||
\end{minipage}
|
||||
|
||||
\vspace{0.1em}
|
||||
|
||||
\begin{minipage}[t]{0.48\textwidth}
|
||||
\outerlist{
|
||||
\entrybig[\textbullet]
|
||||
{\textbf{Cradle} \textit{(Python/Django, 2025)}}{}
|
||||
{Threat intelligence correlation platform.}{}
|
||||
\vspace{0.2em}
|
||||
\entrybig
|
||||
{\textbf{Bachelor Thesis} – GNN Robustness Analysis}{github.com/arg3t/thesis}
|
||||
{Python, PyTorch}{2024}
|
||||
\innerlist{
|
||||
\entry{Analyzed impact of topological perturbations on Graph Neural Network stability across 5 benchmark datasets}
|
||||
\entry{Discovered correlations between 4 graph metrics' perturbations and the model's performance drop}
|
||||
}
|
||||
\end{minipage}
|
||||
\begin{minipage}[t]{0.505\textwidth}
|
||||
\outerlist{
|
||||
\entrybig[\textbullet]
|
||||
{\textbf{Sanctum} \textit{(C/Linux Kernel, 2024)}}{}
|
||||
{Kernel module for seemless process-bound FDE.}{}
|
||||
|
||||
\vspace{0.2em}
|
||||
\entrybig
|
||||
{\textbf{massurl} – High-Performance URL Reconnaissance Tool (C)}{github.com/theFr1nge/massurl - 2021}
|
||||
\innerlist{
|
||||
\entry{Built high-performance URL aggregator and recon tool for processing 250K+ URLs per second.}
|
||||
}
|
||||
\end{minipage}
|
||||
|
||||
\vspace{0.1em}
|
||||
|
||||
\begin{minipage}[t]{0.48\textwidth}
|
||||
\outerlist{
|
||||
\entrybig[\textbullet]
|
||||
{\textbf{Bachelor Thesis} \textit{(Python/ML, 2024)}}{}
|
||||
{Impact of topological perturbations to GNN stability}{}
|
||||
}
|
||||
\end{minipage}
|
||||
\begin{minipage}[t]{0.505\textwidth}
|
||||
\outerlist{
|
||||
\entrybig[\textbullet]
|
||||
{\textbf{Disk Encryption Analyzer} \textit{(Python, 2023)}}{}
|
||||
{Forensic utility to scan disks for encryption artifacts}{}
|
||||
}
|
||||
\end{minipage}
|
||||
|
||||
\vspace{0.1em}
|
||||
|
||||
|
||||
\begin{minipage}[t]{0.48\textwidth}
|
||||
\outerlist{
|
||||
|
||||
\entrybig[\textbullet]
|
||||
{\link{https://github.com/theFr1nge/massurl}{\textbf{massurl}} \textit{(C, 2021)}}{}
|
||||
{URL Reconnaisance Utility}{}
|
||||
|
||||
}
|
||||
\end{minipage}
|
||||
\begin{minipage}[t]{0.505\textwidth}
|
||||
\outerlist{
|
||||
\entrybig[\textbullet]
|
||||
{\link{https://github.com/theFr1nge/YeetClock}{\textbf{YeetClock}} \textit{(Hardware/IoT, 2019)}}{}
|
||||
{An open source smart alarm clock solution.}{}
|
||||
}
|
||||
\end{minipage}
|
||||
|
||||
@ -1,8 +1,6 @@
|
||||
|
||||
\section{Skills}
|
||||
|
||||
\denseouterlist{
|
||||
\entry{\textbf{Languages: } Python, C, Rust, Golang, Java, JavaScript, Bash}
|
||||
\entry{\textbf{Frameworks: } Django, Flask, Tokio Async, QT, React, Spring Boot, JavaFX}
|
||||
\entry{\textbf{Miscellaneous: } Linux Kernel, Systems Security, Consensus Protocols, Concurrency, DAG Blockchain, Order-Fairness, Puzzles}
|
||||
\entry{\textbf{Languages:} Python, C, Rust, Go, Java, JavaScript, Bash}
|
||||
\entry{\textbf{Technologies:} Django, Neo4j, Tokio, Docker, Git, PostgreSQL, React}
|
||||
\entry{\textbf{Domains:} Threat Intelligence, Penetration Testing, Distributed Systems, Consensus Protocols, Digital Forensics}
|
||||
}
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user