I am a passionate Vulnerability Researcher and Developer with experience in cybersecurity automation and AI system design. I built OSS tools and fuzzers for embedded systems (e.g., PLCs, HMIs) aligned with IEC 62443-4-2. I also design automation workflows with n8n, build custom RAG pipelines. Sometimes, I work on fun projects like reverse engineering obfuscated scripts or creating structured knowledge systems.
Jun 2021 - Present
South Korea
As a specialist in OT/ICS and IoT security, we develop vulnerability analysis and response technologies for various smart infrastructure environments.
Jun 2021 - Present
Jun 2020 - Jun 2021
South Korea
An information security specialist company that performed penetration testing.
Jun 2020 - Jun 2021
2012-2024 Bachelor of Science in Computer Science |
Participated as a member of the South Korea-Canada joint team in the world’s largest live-fire cyber defense exercise, achieving 6th place while defending national IT systems and critical infrastructure against thousands of simulated attacks.
Executed Achilles Level 2 certification tests for OT devices, validating protocol robustness and compliance.
Provided end-to-end cyber-safety consulting for medical devices, including threat modeling and regulatory documentation.
Assisted manufacturers in meeting FDA cyber-security guidance for connected medical devices.
Performed vulnerability analysis of maritime OT networks and developed tailored defensive technologies.
Researched side-channel and invasive analysis techniques to verify semiconductor integrity across the supply chain.
Built a scalable cloud cyber-range and developed the Korean Secure Development Lifecycle (K-SDL) curriculum.
Discovered and responsibly disclosed 5 CVEs in commercial IoT devices through protocol fuzzing.
Developed STRIDE-based threat models and mitigation matrices for PLC & HMI product lines.
Built a Python-based toolkit to acquire, parse, and analyze artefacts from compromised IoT devices.
Enhanced ML-driven fingerprinting and anomaly detection engines for smart-building IoT networks.
Upgraded an ICS cyber-range for KEPCO, adding realistic attack/defense scenarios and automated scoring.
Planned and hosted Korea’s premier convergence-security conference, featuring live CTF and workshops.
Conducted web/mobile pentesting and secure-coding review for the bank’s open-banking APIs.
Delivered continuous penetration testing service for HKMC’s enterprise systems.
Performed network, web, and mobile assessments across critical trading infrastructure.
Identified firmware and API vulnerabilities in smart-speaker terminals.
Assessed authentication and business-logic flaws in an ed-tech SaaS platform.
Provided holistic security assessment for UN Technology & Communication Agency infrastructure.
Automated static-analysis queries to uncover zero-days with GitHub CodeQL.
Developed a coverage-guided filesystem-driver fuzzer for Linux kernel; disclosed 16 CVE-class vulnerabilities.
Created a crawler and web dashboard to aggregate university notices in real-time.
Built a Python crawler that delivers keyword-filtered news via chatbot notifications.