Gerard Vince Lillo
About Me
My career is driven by a deep fascination with cybersecurity, from the intricate tactics of offensive security to the robust strategies of defensive engineering. My background in software development with Python and AWS was a strategic choice—to truly protect a system, you must first understand how it's built. This gives me a crucial advantage in the field.
As a Security Engineer, I now apply this dual perspective every day. I thrive on the front lines, whether I'm hunting for threats, conducting penetration tests, or architecting secure cloud infrastructure. It's this constant cycle of challenging systems and then hardening them that fuels my passion. For me, it's not just about building walls; it's about understanding the entire battlefield.
Core Skills
My Arsenal
Development & Automation
Python
- Automation Scripts
- Vulnerability Parsing
- Log Parsers
- API Integration
AWS
- Lambda & SQS
- S3 & EC2
- CloudWatch
- VPC & Security Groups
Linux CLI
- System Admin
- Bash Scripting
- Tool Installation
- VM Management
Jira
- Jira Project
- CI/CD Integration
- Automatic Ticket Creation
- Workflow Automation
Vulnerability & Penetration Testing
Trivy
- CI/CD Scanning
- Filesystem Scans
- IaC Misconfigurations
- Jira Integration
Nmap
- Network Scanning
- Service Discovery
- OS Fingerprinting
- Vuln Assessment
Metasploit
- Exploit Development
- Payload Crafting
- Post-Exploitation
- Penetration Testing
OWASP ZAP
- API Fuzz Testing
- Web App Scanning
- Session Analysis
- Vulnerability ID
Security Operations & Defense
Splunk
- Alert Triage
- Incident Documentation
- IoC Analysis
- Health Checks
Wazuh
- SIEM Hosting
- Log Management
- Linux CLI Setup
- Secure Access (VPC)
Bitdefender
- GravityZone MSP
- Endpoint Protection
- Malware Detection
- Policy Compliance
Commvault
- Cyber Resilience
- Data Protection
- Backup & Recovery
- Disaster Recovery
Featured Project
A personal project built to explore my interest in cryptocurrency, data visualization, and modern front-end technologies.

Veda | L1 Crypto Tracker
Veda is a real-time cryptocurrency dashboard that focuses on tracking and analyzing top Layer-1 (L1) blockchain projects. Users can view price charts, compare market cap and volume, and get technical indicator signals like RSI.
Live from GitHub
Fetching latest projects...
Professional Experience
May 2025 - Present
Security Engineer
Cloud Ready Technologies Corp.
- Designed and implemented a CI/CD security pipeline using Bitbucket Pipelines to automate vulnerability scanning with Trivy.
- Developed a Python-based vulnerability parsing script to process Trivy's JSON reports, identifying critical misconfigurations and de-duplicating findings.
- Automated the security workflow by translating the script into a Bitbucket Pipeline that creates Jira tickets for remediation.
- Performed penetration testing for SaaS API endpoints, identifying and reporting critical issues like CORS misconfigurations and token replay vulnerabilities.
- Delivered detailed pentest documentation, highlighting encryption methods (JWE with AES-256-GCM), fuzz testing results, and session token structure.
July 2024 - April 2025
Security Analyst
Cloud Ready Technologies Corp.
- Monitored and triaged security alerts using Splunk, documenting incidents based on severity and following escalation protocols.
- Analyzed Indicators of Compromise (IoCs) to identify and neutralize threats across multiple client environments.
- Authored weekly health check reports on endpoint malware detection, protection agent status, and policy compliance.
- Provided tailored security recommendations to clients, including system upgrade advisories and mitigation plans.
Jan 2024 - July 2024
Software Engineer
Cloud Ready Technologies Corp.
- Developed Python-based log parsers to automate alert processing and integrate them with Jira for SOC analysts.
- Utilized AWS services like Lambda for serverless execution, CloudWatch for debugging, S3 for storage, and EC2 for hosting Wazuh and Graylog.
- Implemented SQS for message queuing to handle delayed data processing, improving automation and efficiency.
- Configured VPCs and security groups to restrict access and secure Wazuh and Graylog instances.
Certifications
Let's Connect
I'm currently seeking new opportunities. If you have a project in mind or just want to chat, please fill out the form below.