Software Engineer • Security Researcher • Founder of Humifortis
Building Humifortis - a universal incremental risk engine for adaptive security. Specializing in identity systems, access control, real-time threat detection, and continuous authentication frameworks.
I am a software engineer with a strong focus on security research, specializing in adaptive access control, risk assessment systems, and identity infrastructure. My work combines software development expertise (Java, Golang, TypeScript) with security research to build intelligent, real-time security enforcement mechanisms.
Currently, I'm developing Humifortis - a universal incremental risk engine that provides persistent, multi-entity risk scoring consumable by WAFs, IAM systems, API gateways, and applications. The project addresses a critical void in cybersecurity: the lack of a compressed, real-time risk signal that infrastructure can use for adaptive enforcement.
Organization-based Access Control Optimization Based on Suspicious Behavior Detection Using Information Theory
Focus: Adaptive access control optimization leveraging entropy / information theory to detect anomalous request patterns.
DOI: 10.1007/s42979-021-00515-wA Correct-by-Construction Model for Request-Based Access Control
Focus: Formal modeling ensuring policy correctness during design—reducing logic flaws in authorization flows.
DOI: 10.1007/978-3-031-88039-1_4Big Data Access Control for Cloud-Native Hadoop Environments
Focus: Securing distributed data processing pipelines with scalable policy enforcement across Hadoop components.
DOI: 10.24138/jcomss-2025-0023Continuous Single-Sign-On (CSSO) Method for Authentication & Authorization in Microservices
Focus: Extending traditional SSO with continuous, context-aware validation to reduce session misuse in distributed systems.
Preprint DOIEnd-to-end deployments, theme customization, plugin evaluation, performance tuning for institutional e-learning.
Module selection & configuration, workflow customization, secure hosting setup, integration patterns.
Realm design, SSO federation, identity brokering, fine-grained access policies, audit integration.
Custom decoders, rule authoring, alert noise reduction, identity system log mapping, dashboard curation.
Deployment & tuning of ModSecurity with OWASP Core Rule Set: custom rule layering, false-positive reduction, log enrichment & integration with ELK / Wazuh for actionable attack visibility.
A minimal, real-time risk assessment engine that calculates persistent, incremental risk scores for any entity type (users, sessions, API keys, devices, services). Unlike traditional SIEM/UEBA systems that operate in batch mode or RBA solutions limited to authentication, Humifortis provides a universal risk state exploitable across your entire infrastructure in <10ms latency.
Key Innovation: Incremental risk calculation with temporal decay + compressed interface (risk_score, risk_level, confidence, expires_at) consumable by Cloudflare Workers, Keycloak, API Gateways, WAFs, and custom applications.
Use Cases: Adaptive rate limiting, step-up authentication, real-time session revocation, risk-aware tokens, dynamic WAF rules, automated threat response.
Philosophy: "Humifortis" (Latin: humble + strong) reflects my origin as a village child learning that true security requires continuous vigilance, adaptive intelligence, and operational humility - not just expensive tools.
An identity & access management platform that augments traditional SSO with continuous, risk-aware session assurance. Incorporates device / browser / server fingerprint signals, rate limiting, contextual anomaly detection, adaptive & risk-based authentication challenges, full user & role management, OAuth 2.0 authorization flows, and compliance-grade audit trails.
Tooling to audit and validate PDF AcroForm field naming conventions, completeness, structural consistency, and enumerated field catalogs—supports automated QA workflows and integration into document ingestion pipelines.
Modern web-based database backup monitoring & orchestration (Golang + React). Automated backup workflows with cloud synchronization to multiple targets (Google Drive, OneDrive, local storage), integrity verification, retention policies, and encryption.
Custom Wazuh decoders & enrichment rules for Keycloak + Shibboleth to correlate authentication flows with authorization policy outcomes—improving triage speed and reducing false positives.
Looking for help deploying or customizing Moodle, Odoo, Keycloak, or Wazuh? I offer consulting for architecture reviews, secure deployments, performance tuning, and feature extensions.
I also collaborate on education infrastructure initiatives via educosmic.tech.
My primary focus is advancing adaptive security systems through Humifortis and related research. I'm building tools that make real-time, risk-aware security accessible to organizations of all sizes - from startups needing simple, effective threat response to enterprises requiring scalable, multi-layer protection.