root@portfolio:~# |
Application Security Engineer with a software development background specializing in secure code review, web application security, penetration testing, and DevSecOps. Focused on identifying real-world vulnerabilities, validating security findings, and building secure systems across the software development lifecycle.
View My WorkHello, I'm Marco Abreu — an Application Security Engineer with a strong foundation in software development, offensive security, and secure architecture.
My background combines secure software engineering with practical cybersecurity operations. I started in software development working with banking systems, embedded Linux environments, and low-level programming before transitioning fully into Application Security and DevSecOps.
Currently, I work on secure code reviews, web application penetration testing, SAST & DAST validation, vulnerability assessments, CI/CD security integration, and SIEM monitoring.
I hold a Bachelor’s degree in Computer Science and a Master’s degree in Cybersecurity Engineering, where my thesis focused on AI-generated metamorphic malware and defensive system evaluation, achieving a final grade of 19/20.
My main interests include: Application Security, Offensive Security, Secure SDLC, DevSecOps, Vulnerability Research, and Web Exploitation.
Years in Tech
Year in Application Security
CTF Flags
Master’s thesis framework using LLMs to generate context-aware malware mutations and evaluate detection evasion with statistical metrics.
A comprehensive Python security toolkit featuring port scanning, DoS simulations, secure messaging, log analysis, and port knocking.
Multi-factor authentication using facial recognition, keystroke dynamics, and ML-based behavioral analysis.
PowerShell-based live forensic data collection tool for volatile and non-volatile evidence gathering.
Cryptography learning tool with step-by-step visualizations, brute-force attacks, and known-plaintext analysis.
This project demonstrates Infrastructure-as-Code (IaC) security scanning using Terraform and Checkov.
A full security audit and remediation of a deliberately vulnerable web application. Each backend file is analyzed, exploited, and rewritten using secure coding practices.
Step-by-step tutorial demonstrating an XXE attack and session cookie forgery on a vulnerable Play Framework web server (v2.1.3), including post-exploitation with SSH brute-force.
Theorical approach on Metamorphic Malware and the use of Artificial Intelligence on malware generation.
I am currently developing my skills further through platforms like Hack The Box and am open to opportunities in cybersecurity engineering, SOC operations, and offensive security.