Hi, I'm
Leonardo
I’m an experienced cybersecurity professional with strong expertise in penetration testing, vulnerability assessment, red-team operations, and cloud security solutions.
I’ve worked across industries like finance, e-commerce, and healthcare to design secure architectures and mitigate real-world threats. I’m also an active bug bounty hunter and occasionally conduct cybersecurity workshops and training sessions.
Cybersecurity Research &
Initiatives
This section highlights my academic and hands-on work in cybersecurity, focusing on protecting digital systems and networks from emerging threats. It includes projects on intrusion detection, cloud security, automated penetration testing, and real-time threat analysis. Through research and practical implementations, I have explored areas like AI-driven threat detection, secure cloud deployment, vulnerability assessment, and compliance monitoring. This portfolio section demonstrates my ability to combine theoretical knowledge with applied security solutions, emphasizing proactive defense strategies, automation, and innovative cybersecurity practices for real-world scenarios.
What Sets
Me Apart
What sets me apart is my ability to blend deep technical knowledge with practical cybersecurity solutions. I excel in designing and implementing secure systems, from real-time intrusion detection and automated penetration testing to cloud security and compliance monitoring. My experience spans AI-driven threat detection, proactive vulnerability assessment, and rapid incident response, ensuring robust protection against evolving cyber threats. I thrive in high-pressure environments, translating complex security challenges into actionable solutions while continuously learning emerging technologies. My commitment to innovation, automation, and hands-on problem-solving distinguishes me as a cybersecurity professional capable of delivering enterprise-ready, resilient security systems.
Questions that
Excite me
How can AI detect unknown cyber threats before they cause damage?
What strategies ensure robust cloud security in multi-tenant environments?
How can automated penetration testing improve system resilience and reduce human error?
How can real-time monitoring and threat intelligence enable proactive defense?
What innovative methods can anticipate, analyze, and mitigate evolving cyber risks?