I build energy systems and find the gaps in them. My background in power electronics and ICS gives me an engineer's view of critical infrastructure that most security practitioners don't have. HTB Global Rank #946.
I'm an electrical engineer focused on the intersection of power systems and offensive security specifically the question of how energy infrastructure can be compromised by someone who understands how it's built. I hold a BEng from University College Dublin (GPA 3.0+) and an MSc in Energy & Power Systems from the University of Liverpool, completed with Distinction.
On the offensive side, I hold HTB Global Rank #946. I do CTF challenges, binary exploitation, and reverse engineering as a discipline decompiling binaries, patching executables, and working through crackmes from the disassembly up. My writeups are public on Notion.
That combination is deliberate. Understanding how power infrastructure is engineered gives me a different lens when analysing how it fails under attack. I'm positioned for roles where both sides of that equation matter.
Penetration testing, network analysis, and vulnerability assessment across CTF platforms and real-target environments.
Static and dynamic analysis of x86-64 binaries, disassembly, decompilation, memory inspection, and patch development from the ground up.
Simulation and control of power electronic converters, energy harvesting at the nanoscale, and model predictive control design.
Embedded systems programming, Wi-Fi physical-layer data extraction, and sensor integration on microcontroller platforms.
Python for automation, signal processing, and data pipelines. C/C++ for low-level and embedded work. Comfortable across Linux and Windows targets.