Dual-profile engineering student combining rigorous academic training in Cybersecurity & AI from the University of Málaga with intensive, high-performance programming skills from 42 Málaga. I thrive on solving complex problems at the intersection of security and artificial intelligence. With hands-on experience mentoring 100+ students in a Google.org-funded bootcamp and building production-ready security tools, I bring both technical depth and strong communication skills to every project. Currently seeking opportunities to apply my skills in Deep Learning, Secure Programming, and Vulnerability Research.
C
Python
HTML
JavaScript
CSS
Docker
PyTorch
SQL
Bash
Git
Linux/Unix
Swift

Google.org & University of Málaga
Selected to mentor 100+ university students in an intensive cybersecurity program funded by Google.org. Designed and deployed a custom CTF (Capture The Flag) competition, engineering challenges in cryptography and reverse engineering. Received specialized training from NICS Lab (National Cybersecurity Institute). Recognized for exceptional technical communication and leadership in multicultural environments.
Freelance & Academic Projects
Developed high-performance algorithms, security tools, and AI-powered applications. Built end-to-end solutions from system-level programming in C to full-stack web applications with Python/Flask. Focused on writing clean, maintainable, and secure code.
University of Málaga (UMA)
Specialized degree combining cybersecurity fundamentals with AI/ML engineering. Key coursework: Deep Learning, Cryptography, Secure Programming, Network Security. On track to complete 3rd year (180+ ECTS) by June 2026. High School GPA: 10/10 with Honors.
42 Málaga - Fundación Telefónica
Intensive peer-to-peer coding program focused on C programming, Unix system architecture, and memory management. Methodology emphasizes autonomous problem-solving, code review, and high-performance standards without traditional instructors.
University of Málaga
Specialized training in digital evidence analysis, disk imaging, email forensics, and chain of custody management. Proficient with forensic tools including Autopsy and CAINE for data recovery and investigation.
Professional Security Tool with Real-time CVE Detection
Engineered a professional Static Application Security Testing (SAST) system that detects vulnerabilities in real-time by integrating with the official NIST NVD API. Built an interactive Flask dashboard with optimized SQL queries for high-volume CVE datasets. Implemented project management features with customizable risk acceptability criteria. Deployed using Docker for consistent environments.

Mobile App with Personalized Training & Nutrition
Developing a mobile application that leverages AI to generate personalized fitness routines and meal plans. The system considers user health data including physical conditions, food intolerances, and energy levels to dynamically adjust recommendations. Features modern UI design, progress tracking, and a comprehensive approach to physical and nutritional well-being.

Custom Unix Shell Built from Scratch in C
Re-engineered a fully functional Bash-like shell from scratch in C. Handled low-level process creation (fork/exec), signal management, pipes, I/O redirection, and direct memory manipulation. Demonstrates deep understanding of Unix system calls, kernel interaction, and rigorous memory safety practices.

Custom Implementation of libc Functions
Recreated essential functions from the C standard library, providing a solid foundation for low-level development. Includes memory management (malloc, free patterns), string manipulation, and linked list operations. Designed with a focus on memory safety and code optimization for reuse in complex projects.

Custom printf Implementation with Variadic Functions
Built a custom implementation of the printf function to master string formatting, output handling, and variadic functions in C. Supports multiple format specifiers including integers, strings, hexadecimals, and pointers. Demonstrates strong understanding of low-level C programming patterns.
