CyberSecurity Student & Researcher

Bypassing the
boundaries.

Passionate about understanding complex systems. Focused on academic research, low-level vulnerabilities, and offensive security principles.

Academic Pursuit of Security.

I am a Cybersecurity Student and Researcher operating at the intersection of low-level system design and high-level adversarial concepts. I believe real security requires a deep, foundational understanding of how systems fail.

My academic focus lies in analyzing complex architectures to find critical flaws. I am constantly learning and exploring new ways to secure digital infrastructure through rigorous research.

Identity Verification

1. Download public key:

LeonardoSpadoni.asc

2. Import to your keyring:

> gpg --import LeonardoSpadoni.asc
> gpg --verify message.sig

Academic Focus

Offensive Security

Studying Red Teaming methodologies, Advanced Persistent Threat (APT) concepts, and Web/API Enumeration.

Defensive Engineering

Researching SIEM architectures, Threat Hunting concepts, and incident response frameworks in academic lab environments.

Cloud Infrastructure

Exploring AWS/Azure security best practices, container hardening, and the principles of immutable infrastructure.

Secure Development

Focusing on low-level programming in Go, Python, and Rust. Building secure-by-design academic projects.

Academics & Certifications

BSc Computer Engineering

University of Salerno • 2024

MSc Cybersecurity

University of Rome "La Sapienza" • In Progress

eJPT Certification

INE Security • Achieved

OSCP Certification

OffSec • In Progress

Erasmus+ Programme

Universitat de València • 2026

Skill
Development.

Theoretical knowledge and practical application in key cybersecurity domains.

Penetration Testing

Identifying and exploiting vulnerabilities across external and internal perimeters using advanced adversarial methodologies.

Exploit Development

Crafting custom payloads and researching memory corruption, binary exploitation, and low-level software vulnerabilities.

Cloud Security

Securing AWS/Azure infrastructures, conducting cloud penetration tests, and analyzing container orchestration vulnerabilities.

Malware Analysis & RE

Reverse engineering compiled binaries and analyzing malicious software behavior using static and dynamic analysis techniques.

Incident Response

Handling security breaches, containing threats, and performing forensic analysis to understand the scope of compromise.

Threat Hunting

Proactively searching through networks and endpoints to detect and isolate advanced threats that evade traditional security solutions.

Professional Operations

Freelance &
Consulting.

Delivering end-to-end engineering and offensive security assessments for modern infrastructure.

Full Stack Development

Architecting and building secure, scalable, and high-performance web applications. From modern frontends to robust backend APIs and database designs.

React/Next.js Node.js Secure Architecture

App Development

Cross-platform and native mobile application development with a security-first approach to protect user data and prevent reverse engineering.

Penetration Testing

Simulating sophisticated cyber attacks on your infrastructure and applications to uncover critical exploitable vulnerabilities.

Vulnerability Assessment

Systematic scanning and manual verification of your digital assets to identify, quantify, and prioritize security weaknesses.

Security Auditing

Comprehensive source code review, architecture analysis, and compliance checks to ensure robust defense-in-depth strategies.

Encrypted Handshake

Establish
Connection.

My inbox is open for new opportunities, consulting requests, or challenging contracts. Communication is strictly confidential.

Primary Channel

Send me an email directly. For highly sensitive information, please use my PGP key to encrypt your message payload before transmission.

Initialize Email
leonardospadoni@proton.me

Public Key

Verify my identity or encrypt payloads destined for my inbox.

LeonardoSpadoni.asc

Session ID

05c6e053b21645757d55e6c4ee8fe0609296...(ask)