Molecular → Cyber Virology
Conceptual framework bridging outbreak intelligence and malware propagation: R₀ models, kill‑chain parallels, and defense-in-depth mapped to biosafety tiers.
PhD-trained molecular virologist pivoting into cybersecurity and network engineering. I bring lab-grade rigor to critical infrastructure, SOC analysis, and OT/rail security.
Conceptual framework bridging outbreak intelligence and malware propagation: R₀ models, kill‑chain parallels, and defense-in-depth mapped to biosafety tiers.
Segregated VLAN lab (Internal/SmartHome/Guest/Quarantine), IDS/IPS evaluation, DNSCrypt/DoH, NetFlow telemetry, attack simulation with nmap/Zeek.
NIS2 gap analysis for EU rail ops; OT/IT boundary risks in signalling; incident playbooks for cross‑border rerouting and passenger-rights comms.
Policy + technical brief on deploying ICNG‑DE for Amsterdam–Berlin: signalling stack, certification plan, timetable paths, and cost curve vs ICE.
Minimal‑budget SOC playbooks: log triage, network baselining, and high‑signal alerts. Built for small teams and public sector.
Self‑sabotage firewall — applying threat modeling to personal productivity. Boundaries, fail‑safes, and incident response for the mind.
Hi, I’m Teo. I trained in molecular virology (SARS‑CoV‑2 focus) and now channel that systems rigor into cybersecurity. I like clean architectures, clear playbooks, and humane teams. I’m practical, budget‑aware, and allergic to performative nonsense.