Source
Converted from your local HEIC files and stripped of image metadata before publishing.
About
I am a backend, platform, and security engineer who likes difficult systems work. I care about reliability, clear architecture, real debugging, and building things that still make sense once they are running in the real world.
University of Maryland
These images come from the local HEIC files you provided. They connect the About page to your University of Maryland cybersecurity engineering background without using online images or AI-generated campus scenes.


Background
My M.Eng. in Cybersecurity Engineering at the University of Maryland, College Park strengthened the secure systems, cloud security, offensive practice, and defensive engineering work behind this portfolio.
Source
Converted from your local HEIC files and stripped of image metadata before publishing.
Style
Real campus context without synthetic backgrounds, stock imagery, or external photo credits.
Who I Am
My strongest work usually sits somewhere between backend engineering, platform reliability, and security. I like being close to the runtime, the telemetry, the packet flow, the release process, and the debugging trail when something goes wrong.
I enjoy building useful systems, but I also care a lot about whether the system is explainable. If a service is hard to observe, hard to reason about, or easy to break during rollout, I do not consider the job finished yet.
Why security stays close
A lot of my interest in security comes from the same mindset. I want systems to be safer in ways that are concrete, observable, and operational instead of cosmetic.
What I Want To Keep Doing
Backend or platform teams where reliability, observability, and performance are treated as engineering work, not cleanup.
Security-minded environments where guardrails, automation, and debugging depth matter more than buzzwords.
Teams that value ownership, clear communication, and engineers who stay with the hard parts after launch.
Strengths
I tend to be most useful when a project needs architecture, implementation, and post-launch follow-through from the same person.
Capability
I design concurrent services and data paths with explicit attention to latency, backpressure, rollout safety, and failure recovery.
Capability
I translate security risk into maintainable controls: policy gates, CI checks, telemetry, detection content, and remediation workflows teams can keep running.
Capability
I trace crashes and unsafe states through binaries, memory layouts, allocators, syscalls, and operating-system behavior when the bug sits below the application layer.
Capability
I use OpenTelemetry, metrics, logs, and automation to reduce mean time to explanation, not just mean time to notice.
Working style
Technical range matters, but I care just as much about whether the work is observable, supportable, and trustworthy after the first release.
Candor
I report risk, uncertainty, and tradeoffs directly. If the evidence is thin or the system is unsafe, I say so.
That matters in debugging, incident response, and security review, where false confidence is expensive.
Ownership
I stay with the hard parts of the work: incidents, cleanup, remediation, and operational follow-through after the visible milestone.
In practice, ownership looks like reliability under pressure and consistency with the team.
Disciplined Work
I am comfortable with repetitive, detail-heavy work when it improves the system: instrumentation, hardening, regression analysis, and documentation.
The result is usually better reliability, clearer handoffs, and fewer repeated failures.
Execution Depth
The goal is not to sound broad. The goal is to stay useful when the work crosses multiple layers and somebody needs to keep the whole thing understandable.
Operating layer
I stay involved from architecture through production reliability, including observability, rollout safety, and post-release hardening.
That keeps delivery grounded in runtime behavior, not just feature completeness.
Operating layer
I treat secure defaults, policy guardrails, and attack-surface reduction as part of engineering quality rather than optional add-ons.
That approach reduces rework and shortens the path from risk discovery to remediation.
Operating layer
I write incident notes, project summaries, and technical handoff material that helps teams move quickly with shared context.
Good communication turns debugging depth into team-level velocity.
Interests
Operating system behavior, binary internals, allocators, and debugging beneath higher-level abstractions.
Exploit techniques, real incident writeups, and defensive patterns that hold up outside lab conditions.
How autonomous workflows fail, how they can be abused, and how to build safer tool-use patterns around them.
Systems that remain observable, resilient, and performant as scale, concurrency, and failure modes increase.
Technical range