Cybersecurity
Understanding End-to-End Encryption
A practical guide to implementing E2EE in modern applications without compromising user experience.
Read Article →Software Developer & Security Specialist
Technology enthusiast with a passion for building secure, high-performance applications. I specialize in software development, cybersecurity, and IT solutions that drive innovation and protect digital assets.
More About Me
"My journey into technology started in high school when I discovered VPN technology. I became fascinated by how secure internet access worked behind the scenes. What began as curiosity quickly turned into a deep passion for cybersecurity. As I explored how systems are protected, I started asking bigger questions about the software itself — how it's designed, built, and secured from the ground up."
"That curiosity shaped my path into software development, where I focus on building modern, reliable, and secure applications with real purpose. When I'm not coding, I'm probably reading about the latest security vulnerabilities, contributing to open source, or teaching others about ethical hacking."
View My Tech StackDevelopment • Security • Data • Design
Portfolio
Data Tool
Lightning-fast Excel to JSON converter with drag-and-drop interface and batch processing capabilities.
Education
Central University of Technology | Networks & Security, Software Development, Databases
Cisco Networking Academy | Advanced Python programming, functions, modules, data structures
Cisco Networking Academy | Penetration testing, vulnerability assessment
Cisco Networking Academy | Security fundamentals, threat analysis
IBM | RPA fundamentals, automation design
Cybrary | Security management, risk assessment
Cisco Networking Academy | Computer hardware, software troubleshooting
Department of Basic Education | Completed secondary education
Insights
Cybersecurity
A practical guide to implementing E2EE in modern applications without compromising user experience.
Read Article →Performance
Advanced techniques for keeping React apps fast, from code splitting to memoization strategies.
Read Article →Data Science
From data cleaning to deployment: a complete workflow for machine learning projects.
Read Article →Get in Touch
Have a project in mind? Need a security audit? Or just want to talk tech? I'm always open to meaningful conversations.