RUGERO TESLA
Security Researcher // CS Student // Industrial Infrastructure
Computer Science student (Year 01/04) specializing in the security and architectural integrity of Critical Infrastructure and Industrial Control Systems. Executing a 4-year research roadmap focused on the convergence of traditional IT and Operational Technology (OT).
Skill_Matrix_Deployment
Industrial & OT Network Security
01Wireshark, tcpdump, SCADA/PLC emulators, GNS3, Kali Linux
ICS/OT protocol analysis (Modbus, DNP3, BACnet), traffic inspection, anomaly detection.
Infrastructure & Network Architecture
02GNS3, Packet Tracer, Nmap, Masscan
VLAN design, routing protocols, subnetting, firewall & ACL configuration, topology design.
Offensive Research & Lab Simulations
03Metasploit, Python/Bash, Burp Suite, VMware
Lab design, vulnerability simulation, penetration methodology, exploit PoC development.
Attack Path & Lateral Movement
04BloodHound, PowerView, Responder, CrackMapExec
Mapping attack paths, privilege escalation, lateral movement, network reconnaissance.
Tool Development & Automation
05Python, Bash, PowerShell, GitHub Actions
Scripted automation, custom PoC tools, network scanning, log analysis, workflow optimization.
// Mapping the transition from academic theory to industrial application.
The mission is to leverage a 4-year Computer Science degree as a foundation for deep-system security. While the formal curriculum provides the theoretical framework, this laboratory serves as the testing ground for practical application in ICS/OT environments.
This is not just an academic pursuit; it is a systematic build-out of a professional defensive posture. By the time of degree conferral in 2029, the objective is to have a fully documented history of research into secure segmentation, protocol entropy, and industrial attack-path analysis.