I write daemons that don’t just run—they infiltrate. From ICE-breaking algorithms to full-stack web apps, I’m the netrunner you want when results matter. Don’t waste my time with corpo-speak; let’s flatline obstacles and ship something sharp.
I write daemons that don’t just run—they infiltrate. From ICE-breaking algorithms to full-stack web apps, I’m the netrunner you want when results matter. Don’t waste my time with corpo-speak; let’s flatline obstacles and ship something sharp.
Arasaka Academy of Cyberwarfare 2073–2077
Bachelor of Science in Cyber Engineering with a Specialization in Autonomous Systems
Rust, JavaScript/TypeScript, C/C++, Java, C#, Python, Bash
Node.js/Bun, Svelte, Docker, Git, Unity, HTML/CSS, Linux/UNIX
Fluent in Russian, Netwatch-certified ICE-breaker (level 3)
Software Daemon Engineer 2077–present
Authored state-of-the-art ICE-breaking daemons in Rust capable of penetrating Militech’s 4th-gen military defense systems. These daemons ensured secure corporate espionage and covert data exfiltration.
Developed firmware for high-security cybernetic implants in C on a custom Arasaka ARM platform, incorporating next-gen quantum encryption and real-time diagnostics over a custom Netwatch-restricted comm stack.
Engineered optimized C/C++ storage modules for neuro-mapped data extraction from cyberbrain implants, integrating it into black-site testing labs. Maintained covert REST API endpoints for secure data flow between Arasaka outposts.
Led a multi-disciplinary team in developing next-gen ICEbreakers, synchronizing code and hardware across various platforms (RaspberryPi-based netrunners, Arasaka Zero-One servers). Integrated fault-tolerant neural network learning capabilities.
Re-engineered black-box cryptographic routines for OTA firmware updates on secure cybernetic devices, reducing execution time by 40% while ensuring minimal footprint for stealth installations on low-resource cyberimplants.
Implemented containerized virtual environments via Docker for secure and reproducible code deployment, minimizing detection risks during Arasaka’s black ops.
Reverse-engineered ancient Militech firmware running on pre-collapse systems, writing custom Z180-based emulators to deploy covert backdoor access for future operations.
Collaborated with high-profile clients in Night City’s underworld to deliver bespoke software solutions tailored to their highly specific security needs. Provided continuous updates and troubleshooting for deployed daemons.
Senior Netrunner Research Assistant 2075–2077