This commit is contained in:
@@ -1,42 +1,28 @@
|
||||
|
||||
\section{Experience}
|
||||
|
||||
\outerlist{
|
||||
|
||||
\entrybig
|
||||
{\textbf{PRODAFT}}{\textit{ Den Haag, NL }}
|
||||
{\textit{ Developer \& Offensive Cyber Threat Intelligence Analyst }}{\textit{ September 2022 - Present }}
|
||||
{\textbf{PRODAFT}}{Den Haag, NL}
|
||||
{Developer \& Offensive Cyber Threat Intelligence Analyst}{Sept 2022 – Present}
|
||||
\innerlist{
|
||||
\entry{Working on a threat intelligence correlation platform (CRADLE) to aggregate artifacts from data sources with high throughput.}
|
||||
\entry{Development and implementation of graph-based algorithms using Neo4J: PageRank, Recommendation, Explainable AI, Risk Prediction.}
|
||||
\entry{Internal tool development for automating TI tasks, management of team members and collaborative knowledge management.}
|
||||
\entry{Proactive threat hunting and penetration testing}
|
||||
\entry{Maintain the OSS threat intelligence correlation platform (CRADLE) processing 15000+ weekly artifacts from 5 data sources, reducing analysis time by 45\%}
|
||||
\entry{Lead a team of 5 engineers to develop the open source threat intelligence platform CRADLE, with 200+ stars on GitHub}
|
||||
\entry{Implemented graph-based correlation algorithms (PageRank, risk propagation) in Neo4j for threat classification and propagation across 1M+ nodes}
|
||||
\entry{Automated 8 manual threat intelligence workflows using Python, saving 20 hours weekly}
|
||||
\entry{Conducted threat hunting operations, writing and releasing 2 reports and giving a talk in the ONE Security Security Summit 2024}
|
||||
}
|
||||
|
||||
\vspace{0.2em}
|
||||
|
||||
\entrybig
|
||||
{\textbf{TU Delft}}{\textit{ Delft, NL }}
|
||||
{\textit{ Teaching Assistant }}{\textit{ September 2022 - Present }}
|
||||
{\textbf{TU Delft}}{Delft, NL}
|
||||
{Teaching Assistant}{Sept 2022 – Present}
|
||||
\innerlist{
|
||||
\entry{Assisted in the teaching of the courses OOP, Computer Organization, Database Technologies, Embedded Software, Distributed Systems, Software Project.}
|
||||
\entry{Instructed 500+ students across 6 computer science courses including Computer Organisation, Distributed Systems, and Embedded Software}
|
||||
}
|
||||
|
||||
\vspace{0.2em}
|
||||
|
||||
\entrybig
|
||||
{\textbf{Rotterdam Police Department}}{\textit{ Rotterdam, NL }}
|
||||
{\textit{ Intern at Team Zeden and TBKK }}{\textit{ April 2023 - July 2023 }}
|
||||
{\textbf{Rotterdam Police Department}}{Rotterdam, NL}
|
||||
{Digital Forensics Automation Developer Intern}{Apr 2023 – July 2023}
|
||||
\innerlist{
|
||||
\entry{Worked on the development of an internal tool used for detection of encrypted containers in a live system or forensic evidence files.}
|
||||
}
|
||||
|
||||
\vspace{0.2em}
|
||||
|
||||
\entrybig
|
||||
{\textbf{ASELSAN}}{\textit{ Ankara, TR }}
|
||||
{\textit{ Intern at Software and Hardware Design }}{\textit{ January 2020 - February 2020 }}
|
||||
\innerlist{
|
||||
\entry{Designed and produced a simple timing circuit \\ Learned the basics of FPGA design and developed a simple FPGA project using VHDL. }
|
||||
\entry{Developed Python-based forensic tool detecting encrypted containers in 5TB+ evidence files, fully eliminating manual analysis tasks}
|
||||
}
|
||||
}
|
||||
|
||||
@@ -1,70 +1,33 @@
|
||||
\section{Projects}
|
||||
|
||||
\begin{minipage}[t]{0.48\textwidth}
|
||||
\outerlist{
|
||||
\entrybig[\textbullet]
|
||||
{\textbf{Tilikum} \textit{(Rust/Tokio, 2025)}}{}
|
||||
{DAG-based fair-ordering atop Narwhal/Tusk}{}
|
||||
\entrybig
|
||||
{\textbf{Tilikum} – DAG-based Consensus Protocol with Fair Ordering}{github.com/arg3t/tilikum}
|
||||
{Rust, Tokio}{2024 – 2025}
|
||||
\innerlist{
|
||||
\entry{Developed fair-ordering algorithm preventing MEV attacks using ordering linearizability and batch-order-fairness}
|
||||
\entry{Optimized the BFT Consensus mechanism to achieve 12000 tx/s throughput with <2s latency (big improvement for fair ordering protocols)}
|
||||
}
|
||||
\end{minipage}
|
||||
\begin{minipage}[t]{0.505\textwidth}
|
||||
\outerlist{
|
||||
\entrybig[\textbullet]
|
||||
{\textbf{BlueBell} \textit{(C/Linux Kernel, 2025)}}{}
|
||||
{WIP. Please reach out for details.}{}
|
||||
\vspace{0.2em}
|
||||
\entrybig
|
||||
{\textbf{Sanctum} – Process-Bound Full Disk Encryption}{github.com/arg3t/sanctum}
|
||||
{C, Linux Kernel}{2024}
|
||||
\innerlist{
|
||||
\entry{Developed kernel module enabling transparent per-process encryption to achieve complete data confidentiality in multi-user systems}
|
||||
}
|
||||
\end{minipage}
|
||||
|
||||
\vspace{0.1em}
|
||||
|
||||
\begin{minipage}[t]{0.48\textwidth}
|
||||
\outerlist{
|
||||
\entrybig[\textbullet]
|
||||
{\textbf{Cradle} \textit{(Python/Django, 2025)}}{}
|
||||
{Threat intelligence correlation platform.}{}
|
||||
\vspace{0.2em}
|
||||
\entrybig
|
||||
{\textbf{Bachelor Thesis} – GNN Robustness Analysis}{github.com/arg3t/thesis}
|
||||
{Python, PyTorch}{2024}
|
||||
\innerlist{
|
||||
\entry{Analyzed impact of topological perturbations on Graph Neural Network stability across 5 benchmark datasets}
|
||||
\entry{Discovered correlations between 4 graph metrics' perturbations and the model's performance drop}
|
||||
}
|
||||
\end{minipage}
|
||||
\begin{minipage}[t]{0.505\textwidth}
|
||||
\outerlist{
|
||||
\entrybig[\textbullet]
|
||||
{\textbf{Sanctum} \textit{(C/Linux Kernel, 2024)}}{}
|
||||
{Kernel module for seemless process-bound FDE.}{}
|
||||
|
||||
\vspace{0.2em}
|
||||
\entrybig
|
||||
{\textbf{massurl} – High-Performance URL Reconnaissance Tool (C)}{github.com/theFr1nge/massurl - 2021}
|
||||
\innerlist{
|
||||
\entry{Built high-performance URL aggregator and recon tool for processing 250K+ URLs per second.}
|
||||
}
|
||||
\end{minipage}
|
||||
|
||||
\vspace{0.1em}
|
||||
|
||||
\begin{minipage}[t]{0.48\textwidth}
|
||||
\outerlist{
|
||||
\entrybig[\textbullet]
|
||||
{\textbf{Bachelor Thesis} \textit{(Python/ML, 2024)}}{}
|
||||
{Impact of topological perturbations to GNN stability}{}
|
||||
}
|
||||
\end{minipage}
|
||||
\begin{minipage}[t]{0.505\textwidth}
|
||||
\outerlist{
|
||||
\entrybig[\textbullet]
|
||||
{\textbf{Disk Encryption Analyzer} \textit{(Python, 2023)}}{}
|
||||
{Forensic utility to scan disks for encryption artifacts}{}
|
||||
}
|
||||
\end{minipage}
|
||||
|
||||
\vspace{0.1em}
|
||||
|
||||
|
||||
\begin{minipage}[t]{0.48\textwidth}
|
||||
\outerlist{
|
||||
|
||||
\entrybig[\textbullet]
|
||||
{\link{https://github.com/theFr1nge/massurl}{\textbf{massurl}} \textit{(C, 2021)}}{}
|
||||
{URL Reconnaisance Utility}{}
|
||||
|
||||
}
|
||||
\end{minipage}
|
||||
\begin{minipage}[t]{0.505\textwidth}
|
||||
\outerlist{
|
||||
\entrybig[\textbullet]
|
||||
{\link{https://github.com/theFr1nge/YeetClock}{\textbf{YeetClock}} \textit{(Hardware/IoT, 2019)}}{}
|
||||
{An open source smart alarm clock solution.}{}
|
||||
}
|
||||
\end{minipage}
|
||||
|
||||
@@ -1,8 +1,6 @@
|
||||
|
||||
\section{Skills}
|
||||
|
||||
\denseouterlist{
|
||||
\entry{\textbf{Languages: } Python, C, Rust, Golang, Java, JavaScript, Bash}
|
||||
\entry{\textbf{Frameworks: } Django, Flask, Tokio Async, QT, React, Spring Boot, JavaFX}
|
||||
\entry{\textbf{Miscellaneous: } Linux Kernel, Systems Security, Consensus Protocols, Concurrency, DAG Blockchain, Order-Fairness, Puzzles}
|
||||
\entry{\textbf{Languages:} Python, C, Rust, Go, Java, JavaScript, Bash}
|
||||
\entry{\textbf{Technologies:} Django, Neo4j, Tokio, Docker, Git, PostgreSQL, React}
|
||||
\entry{\textbf{Domains:} Threat Intelligence, Penetration Testing, Distributed Systems, Consensus Protocols, Digital Forensics}
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user