I am a Security Software Engineer specializing in bridging the gap between Security Research and System Implementation. I have hands-on experience in building AI-based detection engines and scalable security monitoring systems.
- π Main Focus: Privacy Protection (PII Detection), Log Analysis (ELK), and Endpoint Security.
- π Goal: Building robust security solutions that handle real-world threat data at scale.
Developing a full-stack engine for detecting personally identifiable information (PII).
- Built multi-channel pipelines for Local Files, DB, and Network Packets.
- Implemented NER-based NLP models to optimize detection accuracy.
- Designed REST APIs for seamless integration with enterprise systems.
- Key Takeaway: Handled real-world privacy data pipelines and optimized detection performance.
Real-time PII filtering layer for LLM services.
- Designed a pre/post-processing privacy filter for LLM prompts and outputs.
- Applied NER + rule-based hybrid detection for sensitive data.
- Implemented WebSocket-based streaming interception.
- Key Takeaway: Ensured privacy compliance in AI-driven services.
End-to-end security monitoring and visualization pipeline.
- Built Logstash pipelines to ingest raw security logs.
- Designed custom Elasticsearch indices for anomaly and attack pattern detection.
- Developed Kibana dashboards for real-time incident response.
Automated reconnaissance and threat detection tool.
- Scans
robots.txtandsitemap.xmlto map attack surfaces. - Detects malicious JavaScript keywords to identify client-side threats.
Research on password generation and pattern learning for Korean users.
- Fine-tuned models using RockYou + Korean password datasets.
- Analyzed keyboard-based input patterns over linguistic assumptions.
- Evaluated limitations of PCFG-based approaches.
- Key Takeaway: Conducted data-driven security research beyond conventional heuristics.
- EDR & Endpoint Security
- User-mode process behavior monitoring
- PID β Network connection correlation
- Malware Analysis
- PE file structure, import table, execution flow
- Detection Engines
- Antivirus plugin-based engine architecture
- Kernel β User-mode interface design
- Privacy Engineering
- PII detection & masking pipelines
- AI-assisted data protection systems


