Profile

I have over 10 years of experience in IT across support, infrastructure, automation, cloud, security operations and DevOps. This page lists the technologies I have worked with in real environments, labs or personal projects.

Experience by company / stage

  1. Early career
    • Excel
    • VBA
    • SQL
  2. Development and Linux administration
    • Java
    • Spring Framework
    • Python
    • Bash
    • Git
    • Maven
    • Linux servers: CentOS, OpenSUSE, Arch Linux, Ubuntu
    • Tomcat
    • VirtualBox
    • Access points
    • Iptables and server firewalls
    • Linux hardening (CIS benchmarks)
    • VM backup and restoration
    • User support (computers, printers)
    • Automation scripts
    • Docker
  3. Security operations and event triage
    • Event triage analysis using Mandiant (FireEye) products
    • EDR and XDR (Mandiant products)
    • Tufin
    • SIEM rule creation
    • Docker Compose
    • VMware
    • Wireshark
    • SQL
    • Linux (same distributions as before)
    • Bash
    • Python
  4. DevOps and infrastructure
    • Python
    • Git
    • Nginx
    • GitLab
    • Kubernetes
    • Nagios
    • Bash
    • VMware
    • Docker
    • Ansible
    • HAProxy
  5. Automation, monitoring and security
    • Python
    • Linux
    • Airflow
    • SUSE Manager
    • CIS benchmarks
    • Grafana
    • DataDog
    • GrayLog
    • Excel
    • Bash
    • SQL
    • SIEM
    • Nessus (vulnerability scanning for VMs)
  6. Cloud, IaC and orchestration
    • Vagrant
    • Linux
    • Python
    • Git
    • Consul
    • Nomad
    • SonarQube
    • Azure DevOps (pipeline usage only)
    • Docker
    • Docker Compose
    • Ansible
    • Terraform
    • SQL
    • OpenStack
    • Fortigate firewalls and switches
    • Jenkins
  7. Cloud automation and reporting
    • Python
    • JavaScript (used to understand existing codebase)
    • Excel automation
    • Occasional work with Microsoft Azure APIs (only when required)
    • Power Platform (used when required)
    • Copilot Studio (used when required)

Additional technologies

  1. Microsoft ecosystem (used only when required)
    • Active Directory
    • Windows Server
  2. Security and learning
    • Vulnerable VMs (VulnHub-style machines)
    • Reverse engineering with radare2 (hobby)
    • Started building a small Linux OS from a Udemy tutorial (not continued)
  3. Programming languages explored
    • C (hobby, low-level learning)
    • Assembly (hobby, system internals)
    • Go (learning only, never used in production)
    • JavaScript (used to understand existing codebase)
    • Python (scripts, automation)
    • Bash (scripts, automation)
    • Java (Spring + Hibernate application)

    I explore many languages out of curiosity or to solve specific tasks. I do not consider myself proficient in any of them. Most of my coding is practical: modifying examples, adjusting documentation, or adapting solutions from Stack Overflow. I learn fast but do not focus on mastering a single language — I use whatever is needed to get the job done.

Technology index (alphabetical)

Airflow, Ansible, Arch Linux, Assembly, Azure DevOps, Bash, C, CentOS, CIS benchmarks, Consul, Docker, Docker Compose, EDR/XDR (Mandiant), Excel, Firewalls (Iptables, Fortigate), Git, GitLab, Go, HAProxy, Java, JavaScript, Jenkins, Kubernetes, Linux (CentOS, Ubuntu, OpenSUSE, Arch), Mandiant / FireEye, Maven, Nagios, Nessus, Nomad, Nginx, OpenStack, Python, radare2, Reverse Engineering, SIEM, SonarQube, Spring Framework, SQL, SUSE Manager, Terraform, Tomcat, Tufin, Vagrant, VirtualBox, VMware, Vulnerable VMs, Wireshark, Windows Server (used when required), VBA.