|
1 | 1 | --- |
2 | 2 | # the default layout is 'page' |
3 | 3 | icon: fas fa-bug |
4 | | -order: 4 |
| 4 | +order: 5 |
5 | 5 | --- |
6 | | -I'm Federico Letoile as known as d0x, i'm a system analyst, i work as a devops and app security, I spend my free time finding bugs and doing security research. I'm an active participant in CTFs. I believe they train you to think in a completely different way when it comes to finding web vulnerabilities. |
| 6 | + |
| 7 | +I'm Federico Letoile, also known as d0x. I'm a system analyst working in DevOps and Application Security. In my free time, I hunt bugs through bug bounty programs and conduct security research. |
| 8 | + |
| 9 | +Check out my [Hall of Fame](/hall-of-fame/) for recognized contributions. |
| 10 | + |
| 11 | +### What I'm Looking For |
| 12 | + |
| 13 | +I'm actively seeking opportunities as a **Penetration Tester**. My background in DevOps and application security gives me a deep understanding of how systems are built, and how they can be broken. |
7 | 14 |
|
8 | 15 | ### Certifications |
9 | 16 |
|
10 | | -| Certificación | Entity | Status | |
11 | | -| ----------------------------------- | ------------ | :-----------: | |
12 | | -| CPTS | Hackthebox | Pursuing 🟡 | |
| 17 | +| Certification | Entity | Status | |
| 18 | +| --- | --- | :---: | |
| 19 | +| CWES | HackTheBox | Pursuing 🟡 | |
13 | 20 |
|
14 | 21 | ### Volunteering |
15 | 22 |
|
16 | | -| Ekoparty | Role | Tasks | |
17 | | -| ------------------------------ | :----------------: | ---------------------------------------------------- | |
18 | | -| Ekogroup | Leader and member | organizing events, hacking talks, and doing CTF challenges as a team | |
19 | | - |
20 | | -### Work experience |
21 | | - |
22 | | -- **Penetration Test Engagement (2025)** |
23 | | - - Performed a full-scope security audit for a company, uncovering critical, medium, and low-severity vulnerabilities affecting both infrastructure and applications. |
24 | | - - Produced a detailed report with risk classification, technical evidence, and prioritized remediation recommendations. |
25 | | - - Presented findings to stakeholders and provided technical support to assist in the remediation process. |
26 | | - |
27 | | -- **Devops and app security** |
28 | | - - Automated deployment pipeline creation and management |
29 | | - - AWS server setup, configuration, and administration |
30 | | - - Server maintenance and security management |
31 | | - - Bug analysis and reporting for company software with follow-up on fixes |
32 | | - - Developing automation scripts using Python and Bash |
33 | | - - Proactive monitoring of containers, hardware and networks, and log files. |
34 | | - |
35 | | -- **Security Analyst** |
36 | | - - Linux system installation and SSH key generation. |
37 | | - - Security audit of logins with weak passwords. |
38 | | - - Scanning for open ports and identifying versions of active services. |
39 | | - - Comprehensive reporting of all identified vulnerabilities |
40 | | - |
41 | | -### Reported Security Findings |
42 | | -- Reported SQL Injection (SQLi) and Cross-Site Scripting (XSS) vulnerabilities in Argentinian government websites. |
43 | | -- Disclosed a security vulnerability to the Australian Government. |
44 | | -- Reported a vulnerability in an educational system platform in the United States. |
45 | | - |
46 | | -### Tech stack |
47 | | - |
48 | | -- Bash |
49 | | -- Python |
50 | | -- SQL |
51 | | -- Docker |
52 | | -- Monitoring |
53 | | -- AWS |
| 23 | +| Ekoparty | Role | Tasks | |
| 24 | +| --- | :---: | --- | |
| 25 | +| Ekogroup | Leader and member | Organizing events, hacking talks, and doing CTF challenges as a team | |
| 26 | + |
| 27 | +### Work Experience |
| 28 | + |
| 29 | +- **Penetration Tester (2025)** |
| 30 | + - Conducted full-scope security assessments, identifying critical, medium, and low-severity vulnerabilities across infrastructure and web applications. |
| 31 | + - Delivered detailed reports with risk classification, technical evidence, and actionable remediation guidance. |
| 32 | + - Presented findings to stakeholders and provided hands-on support during remediation. |
| 33 | + |
| 34 | +- **DevOps & Application Security Engineer** |
| 35 | + - Built and managed CI/CD pipelines with security integrations. |
| 36 | + - Administered AWS infrastructure with focus on secure configurations. |
| 37 | + - Performed bug analysis and vulnerability reporting for internal applications. |
| 38 | + - Developed automation scripts in Python and Bash for security tasks. |
| 39 | + - Monitored containers, networks, and system logs for anomalies. |
54 | 40 |
|
| 41 | +### Security Skills |
55 | 42 |
|
| 43 | +- Web Application Testing (OWASP Top 10) |
| 44 | +- Network Penetration Testing |
| 45 | +- Vulnerability Assessment & Reporting |
| 46 | +- Bug Bounty Hunting |
| 47 | +- API Security Testing |
| 48 | +- Python, Bash, SQL, Docker, AWS |
0 commit comments