0x7F · 01000011 · 0x4C · 01000001 · 0x53 · 01010011
[ 01 ]   dossier / samuel verse   ·   jerusalem   ·   2026

Samuel
Verse.

$ whoami →

I build and defend software. Currently working at the intersection of Python development, applied cryptography, and offensive-security research — designing encrypted data pipelines, analyzing malware, and hardening enterprise networks against real-world threats.

Role
SW & Security Eng.
Focus
Python · Crypto · blue/red
Based
Jerusalem, IL
Status
● open to work
§ 02   //   ABOUT

Engineer, both sides of the wire.

$ cat about.md
NameSamuel Verse
RoleSoftware & Security Engineer
DegreeB.Sc. Computer Engineering
SpecializationCybersecurity GPA 86
Shellpython / bash / c++
Domainscrypto · malware · network
Interestshardware · cloud security

I'm a software engineer with a cybersecurity specialization from the Jerusalem College of Technology. My work sits in the overlap between writing production software and defending it against serious adversaries.

Day to day, I automate security workflows in Python, deploy cryptographic key infrastructure for encrypted communication with governmental entities, and reverse malware samples to extract indicators of compromise. I've tuned enterprise security stacks across Microsoft Defender, FortiGate, F5, and Ivanti — and spent meaningful time on the other side of the wire, running penetration tests against the same kinds of systems I now defend.

"The best defenders have broken things. The best builders have defended them."

I care about writing clean, auditable code, making secure-by-default the path of least resistance, and finding the elegant read on a system — whether that system is a C++ binary, a packet capture, or an organization's threat model.

§ 03   //   EXPERIENCE

Selected work

$ git log --oneline
2024 → present NOW

Software & Security Engineer

Jerusalem College of Technology
Jerusalem, Israel
  • Built Python automation for data transmission workflows, streamlining critical delivery to the CERT team and cutting manual reporting overhead.
  • Deployed cryptographic key infrastructure (PuTTYgen, WinSCP) enabling encrypted, authenticated communication with governmental entities.
  • Performed static and dynamic malware analysis — extracting IOCs, mapping behavior patterns, and identifying persistence mechanisms.
  • Led cyber threat analysis and mitigation planning across enterprise and government network segments.
  • Researched and implemented exposure-reduction strategies, lowering incident response time and hardening endpoint resilience.
  • Tuned the enterprise security stack: Microsoft Defender, FortiGate, F5 WAF, Ivanti VPN — securing campus and research networks.
  • Ran threat hunting and protocol analysis in Wireshark and SIEM across ARP, TCP/UDP, TLS/SSL, and HTTP to surface anomalous attacker behavior.
Python Cryptography Malware Analysis SIEM Wireshark FortiGate MS Defender F5 WAF Ivanti VPN IOC Extraction PuTTYgen / WinSCP
2023

Software Engineer

Easysec Solutions Ltd.
Jerusalem, Israel
  • Designed and shipped a Python automation system for security operations workflows.
  • Executed penetration testing and vulnerability research on enterprise networks — including VLAN hopping, CVE exploitation, and packet manipulation.
  • Conducted web pentesting with Burp Suite: packet interception, request modification, and authentication-flow attacks.
Python Pentesting Burp Suite VLAN Hopping CVE Research Packet Manipulation
§ 04   //   PROJECTS

Things I've taken apart.

$ ls ./projects/
01 .asm

Reverse Engineering

Hands-on teardown of compiled binaries — tracing execution flow, patching logic, and recovering intent from unlabeled assembly.

Assembly IDA Pro x64dbg
02 .crypto

Encryption Principles

Implementation and analysis of classical and modern cryptographic primitives — from key exchange to symmetric encryption modes.

Diffie–Hellman RSA Block Cipher Stream Cipher
03 .cpp

C++ Systems Workshop

Deep workshop covering modern C++ mechanics — object lifecycles, exception safety, polymorphism, and careful manual memory management.

OOP RAII Polymorphism Data Structures Algorithms
§ Education
09 / 2019 — 08 / 2023

B.Sc. Computer Engineering

Jerusalem College of Technology
Specialization in Cybersecurity — curriculum spanning systems programming, network security, cryptography, and secure software engineering.
GPA86/100
Languages
French
Hebrew
English
// all three — native / bilingual proficiency
§ 05   //   STACK

Tools of the trade.

$ stack --list
~/stack.yml · 1,247 bytes
Languages
Python C++ Assembly Bash
Security · Offensive
Burp Suite Penetration Testing VLAN Hopping CVE Exploitation Packet Manipulation Web Pentesting
Security · Defensive
Microsoft Defender FortiGate F5 WAF Ivanti VPN SIEM Threat Hunting IOC Extraction
Malware / RE
IDA Pro x64dbg Static Analysis Dynamic Analysis Persistence Mapping
Cryptography
RSA Diffie–Hellman Block Ciphers Stream Ciphers PuTTYgen WinSCP
Networking
Wireshark TCP / UDP TLS / SSL HTTP ARP
Traits
Problem-Solving Adaptable Ethical Leadership Communication Teamwork
§ 06   //   CONTACT
$ ./send_packet --dest samuel

Let's ship something
good together.

Open to roles in software engineering, security engineering, and everything in between. Research collaborations, freelance audits, and interesting conversations equally welcome.

-----BEGIN SIGNATURE BLOCK-----
Name:        Samuel Verse
Role:        Software & Security Engineer
Location:    Jerusalem, IL
Fingerprint: 53:56 · sw+sec · mmxxvi
-----END SIGNATURE BLOCK-----