As an IT-Security Architect, my core focus is network security, architecture, and analysis — designing and evaluating layered defences that hold up against real-world attack patterns. From perimeter to endpoint, I work across the full security stack to ensure that every layer is understood, documented, and hardened.
A significant part of my day-to-day work sits inside the SOC: investigating alerts, correlating events, and translating raw log data into actionable intelligence. I collaborate closely with teams running firewall, proxy, and AV solutions from various vendors, and I know how these products behave — and where they fall short.
My responsibilities also extend into cloud security and mail security, two areas where threat actors increasingly focus their efforts. Whether it is misconfigured cloud workloads or sophisticated phishing infrastructure, I work to close those gaps before they are exploited.
On this site I document findings, explore emerging attack vectors, and share practical insights from the field — for fellow practitioners and anyone curious about how modern defences are built and broken.
$ whoami
IT-Security Architect — Germany
$ skills --top
$ status
ONLINE — Available for consulting
// INCOMING_TRANSMISSION
In-depth articles on security architecture, threat analysis, and field research are being prepared. Check back soon.
View Article Index