This is a friendly warning that your web-browser does not currently protecting your privacy and/or security as well as you might want. Click on this message to see more information about the issue(s) that were detected. June 16th, 2016 Independence vs. cooperation

Independence vs. cooperation

After working as a Security Engineer for Microsoft and Google, I quit my job in 2013 to pursue a career as an independent Security Researcher. Since then, I've enjoyed the freedom to focus on many different projects and applications, while generating income by discovering and reporting vulnerabilities through Vulnerability Contribution Reward Programs. While working independently has many advantages, it does have one major drawback: no one to bounce ideas off or help you solve problems. So, in order to address this, I am now looking for opportunities to work closer with other researchers again.

I am interested in almost anything related to Computer and Information Security, and my focus has been on web browsers and low-level security issues. I enjoy new and challenging things and would like to work more with applications, protocols and technologies that I have not previously had a chance to investigate. I have the right mind-set and hacker skills to find security issues in practically anything I get my hands on. I have extensive experience in code-review, fuzzing, vulnerability analysis, reverse engineering and exploit development on Windows. This allows me to hit the ground running in any role that requires such skills.

As I am able to generate income in my own time, so I am open to freelance, project based work, as well as part-time and full-time employment. If you have a role that might be a good match to me, let's discuss these options.

I am based in the The Hague area in the Netherlands. Though I have enjoyed working from home for the last ten years, including during my entire employment for both Microsoft and Google, I am open to other options.

You can refer to my Linked­In profile for more details on my past experience. I can be contacted through Linked­In, Twitter or email.

Please note that my personal ethics exclude jobs that involve finding vulnerabilities and/or developing exploits for active use against third parties, such as in government surveillance, law enforcement and cyber-warfare.

© Copyright 2019 by Sky­Lined. Last updated on September 9th, 2019. Creative Commons License This work is licensed under a Creative Commons Attribution-Non‑Commercial 4.0 International License. If you find this web-site useful and would like to make a donation, you can send bitcoin to 183yyxa9s1s1f7JBp­PHPmz­Q346y91Rx5DX.