Skills
Post-Quantum Cryptography (PQC)
Quantum Cryptography & Quantum-Safe Security
Quantum Key Distribution (QKD): BB84, E91
Device-Independent QKD (DI-QKD)
Classical Cryptography (RSA, ECC, AES, Hash Functions)
Cryptographic Protocol Design
Cryptanalysis & Security Analysis
Quantum Attack Models & Threat Analysis
Crypto-Agility Strategies
Secure Key Management
Python (cryptographic implementations & simulations)
Qiskit (quantum protocol simulation)
C / C++ (foundational knowledge)
Algorithm Prototyping & Testing
Secure Software Development
Cryptographic Libraries & APIs
Cloud Security Engineering
Secure Cloud Infrastructure
Incident Response & Security Analysis
Network Security Fundamentals
Security Monitoring & Threat Detection
Professional & Research Skills
Scientific Communication
Conference & Technical Presentations
Cross-Functional Collaboration (Research & Engineering)
Remote & Distributed Team Collaboration
Critical Thinking & Problem Solving
About
I am a cryptography and cybersecurity specialist with a strong academic background in applied mathematics and a research focus on quantum and post-quantum cryptography. I graduated top of my class with a Master’s degree in Cryptography and Cybersecurity, where my work centered on quantum key distribution (BB84, E91), device-independent QKD, and the security implications of quantum computing.
I am currently working at Huawei as a Cloud Security Engineer, where I contribute to securing cloud infrastructure and services in real-world production environments. This role has strengthened my understanding of practical security challenges, incident response, and the deployment constraints that influence cryptographic and security decisions at scale.
Alongside my industry work, I have hands-on experience designing, implementing, and analyzing cryptographic protocols, translating theoretical concepts into practical and testable implementations using Python and Qiskit. My work combines protocol design, security analysis, and performance considerations, with a strong emphasis on quantum and post-quantum attack models.
I am highly analytical, research-driven, and comfortable working at the intersection of theory and practice. My long-term goal is to contribute to the design and evaluation of cryptographic algorithms and protocols that remain secure against future quantum threats, while actively engaging with the cryptography and quantum security research community.