I build and defend software. Currently working at the intersection of Python development, applied cryptography, and offensive-security research — designing encrypted data pipelines, analyzing malware, and hardening enterprise networks against real-world threats.
I'm a software engineer with a cybersecurity specialization from the Jerusalem College of Technology. My work sits in the overlap between writing production software and defending it against serious adversaries.
Day to day, I automate security workflows in Python, deploy cryptographic key infrastructure for encrypted communication with governmental entities, and reverse malware samples to extract indicators of compromise. I've tuned enterprise security stacks across Microsoft Defender, FortiGate, F5, and Ivanti — and spent meaningful time on the other side of the wire, running penetration tests against the same kinds of systems I now defend.
"The best defenders have broken things. The best builders have defended them."
I care about writing clean, auditable code, making secure-by-default the path of least resistance, and finding the elegant read on a system — whether that system is a C++ binary, a packet capture, or an organization's threat model.
Hands-on teardown of compiled binaries — tracing execution flow, patching logic, and recovering intent from unlabeled assembly.
Implementation and analysis of classical and modern cryptographic primitives — from key exchange to symmetric encryption modes.
Deep workshop covering modern C++ mechanics — object lifecycles, exception safety, polymorphism, and careful manual memory management.
Open to roles in software engineering, security engineering, and everything in between. Research collaborations, freelance audits, and interesting conversations equally welcome.
-----BEGIN SIGNATURE BLOCK----- Name: Samuel Verse Role: Software & Security Engineer Location: Jerusalem, IL Fingerprint: 53:56 · sw+sec · mmxxvi -----END SIGNATURE BLOCK-----