Hello, I'm

Vladimir Cuc

OSCP+ & Security+ Certified

Security Engineer & Penetration Tester

I'm passionate about cybersecurity, from offensive security and penetration testing to security operations and cloud infrastructure. I focus on Active Directory attack paths, SIEM-driven detection, and building tooling that strengthens organizational defenses.

Latest Security Insights

Explore my OSCP-style walkthroughs covering enumeration, exploitation, lateral movement, and privilege escalation with clear methodology.

Read Blog Posts

About Me

My path into cybersecurity started with a simple curiosity about how systems break, and how attackers think. Over time, that curiosity became a structured approach to understanding real adversarial behavior, strengthening defenses, and bridging the gap between offensive testing and security engineering.

My work spans offensive security, security operations, and cloud infrastructure. I design realistic attack scenarios and map internal attack paths, but I also tune SIEM detections, investigate alerts, and harden identity and access controls. I enjoy analyzing infrastructure from both sides, finding where organizations fail and building the tooling to fix it.

terminal
$sudo apt install caffeine
error: package already at latest version

Contact Information

(863) 338-7723
vladimircuc007@gmail.com
St. Louis, MO

Education

Bachelor of Science in Computer Science

Florida Southern College

2022 - 2025 • GPA: 3.8

Certifications

OSCP+ CertificationSecurity+ CertificationGoogle Cybersecurity CertificateMicrosoft Security, Compliance, and Identity FundamentalsMicrosoft Azure Fundamentals

Skills & Technologies

Offensive security, security operations, and cloud

Offensive Security

Active Directory Attacks88%
Web App Testing85%
Pivoting/Tunneling82%
Privilege Escalation (Linux/Windows)90%
Lateral Movement86%

Security Operations

SIEM (Splunk)87%
Microsoft Defender85%
Incident Triage84%
Forensic Imaging82%
Log Analysis80%

Cloud & Identity

Azure Fundamentals80%
Identity & Access Management86%
Active Directory Administration83%
Security Compliance (SC-900)78%
Endpoint Management81%

Programming & Tooling

Python91%
PowerShell86%
Bash88%
Java79%
JavaScript82%

Professional Experience

Offensive security and engineering experience in one place

Help Desk Support Technician

Florida Southern College

October 2022 – December 2025
  • Tier-1 support for identity and access issues, resolving account lockouts and MFA problems for 100+ users.
  • Active Directory user management and secure authentication workflows.
  • Troubleshot Windows endpoints, RDP connectivity, and school applications.
  • Communicated technical steps clearly to support safe campus access.

Cybersecurity Intern

Publix Supermarkets Corporate

May 2025 – July 2025
  • Enhanced PowerShell domain-monitoring tool, increasing fraudulent domain detection by 50%.
  • Assisted red-team engineers with AD enumeration and privilege-escalation testing.
  • Triaged 200+ alerts in Microsoft Defender using Splunk queries to identify detection gaps.
  • Performed forensic E01 imaging and tuned SIEM thresholds for better detection accuracy.

Software Engineer Intern

Vertical Digital (Eleco Group)

May 2024 – Aug 2024
  • Designed secure RESTful APIs, improving data-flow efficiency by 40%.
  • Optimized MongoDB operations, reducing query response times by 35%.
  • Developed payment-processing engine, simulating 10,000+ transactions.
  • Worked in Linux environments, supporting offensive-security tooling automation.

Projects

Open-source security tools and automation scripts

RaptorRecon

RaptorRecon

Bash framework for fast OSCP-style recon across multiple targets.

View on GitHub
DragonMap

DragonMap

Bash script for credentialed Active Directory enumeration in assumed-breach scenarios.

View on GitHub

Featured Blog Posts

Penetration testing walkthroughs and security write-ups

Let's Connect

Whether it's penetration testing, security engineering, cloud infrastructure, or building security tooling, I'm always open to interesting problems and collaborations.

(863) 338-7723
phish-terminal
vlad@lab:~/attachments

Phishing Check: Which one is safe to open?