Areas of Work

This is the kind of work I repeatedly take on. It is not a product catalog or a fixed engagement menu.

Security Research & Secure Systems

Work that sits close to risk: vulnerability research, careful handling of sensitive data, and systems where threat models matter as much as code quality.

  • Secure communication flows and disclosure-friendly contact paths
  • Email and messaging pipelines that separate ingestion, parsing, and audit trails
  • Research-heavy implementation where attacker behavior shapes the design

Selected examples

Secure Email Processing on AWS

An event-driven pipeline for receiving, decrypting, sanitizing, classifying, and storing email data across AWS services and an auditable backend.

Data Pipelines & Operational Tooling

I like messy data problems: legacy systems, inconsistent regional formats, manual reconciliation, and the operational work needed to make reporting trustworthy again.

  • Unifying data from brittle or duplicated sources
  • Replacing manual scripts with maintained ingestion and reconciliation flows
  • Building internal tools that make operational work visible and repeatable

Selected examples

Data Pipeline Overhaul

A brittle workflow became a maintained ingestion and reconciliation pipeline built for multi-source reporting and fewer manual interventions.

Applied Algorithms

This is the part of the work where off-the-shelf solutions stop being enough. Most often that means custom computer vision, performance-sensitive pipelines, or problem-specific modeling.

  • Industrial inspection and vision systems under real deployment constraints
  • Performance work for compact models and edge execution
  • Prototype-to-production engineering when the research path is still moving

Selected examples

Vision Algorithms

Computer vision work built around speed, compact models, and edge deployment under real operational constraints.

If your problem does not fit neatly into one of these buckets but still needs careful technical judgment, send context by email.

Open contact details