I’m an undergraduate student in Computer Engineering with a strong foundation in programming languages and data systems.
My current focus is on:
- Building scalable systems with Big Data technologies (Apache Spark, Cloudera).
- Designing intelligent solutions using PyTorch and TensorFlow.
- Exploring secure computing, cryptography, and cybersecurity research.
Comfortable working with:
- Linux-based distros (esp. Kali Linux)
- Terminal workflows with zsh, fish, and Neovim
I focus on the technical intersection of Big Data Analytics and Offensive Security, leveraging automated data processing to identify attack surfaces.
- Vulnerability Research: Analyzing software binaries and web architectures for common OWASP Top 10 vulnerabilities and logic flaws.
- Post-Exploitation: Developing custom payloads for Lateral Movement and maintaining persistence in Unix-based environments.
- Infrastructure: Hardening and auditing distributed systems (Hadoop/Spark clusters) against unauthorized access.
- CTF Focus: Active in pwn, crypto, and web categories.
I am actively involved in the Spanish cybersecurity scene, specifically focusing on hardware exploitation and complex CTF environments.
- Hardware Hacking CTF – Official RootedCON PACMAN Badge:
- Performed technical analysis and vulnerability exploitation on the official RootedCON hardware.
- Executed Reverse Engineering on the SoC ESP32-WROOM-32E, firmware extraction and interface analysis (UART/JTAG).
- Var Group Iberia & Yarix CTF:
- Ranked 13th overall out of ~250 participants in a highly competitive, multi-domain laboratory.
- Tackled advanced scenarios spanning Active Directory (privilege escalation, lateral movement), Web Security, and Artificial Intelligence vulnerabilities.
- Applied a Purple Team methodology, correlating offensive exploit execution (Red Team) with defensive threat detection and infrastructure hardening (Blue Team).



