Cybersecurity Student & Developer

Szymon
Linda

2nd-year Cybersecurity student at Wrocław University of Science and Technology. I build security tools: network monitors, system daemons, shells in C. Currently working an IAM internship at Schaeffler while finishing Lynx, a Linux HIDS daemon I'm writing from scratch.

Open to junior roles & internships

Who I Am

I study cybersecurity engineering at Wrocław University of Science and Technology. The program covers the usual suspects: network security, OS internals, PKI, forensics, cryptography. It's decent on theory; I try to make up the gap on the practical side.

Most of what I've learned about security came from building things and breaking them in VMs. Writing a Unix shell in C tought me more about process management than any lecture. Same with building a NIDS, I've started caring a lot more about TCP flags.

I daily drive Linux, use QEMU/KVM for lab work, and have a Windows dual-boot for when I need it. My current focus is IAM at Schaeffler during the day and Lynx (my HIDS daemon) in the evenings.

6 Public Projects
2nd Year at PWr CBE
3+ Languages Used
4yr Industry Experience

Technical Stack

// Security
Network Analysis NIDS / HIDS Digital Forensics Volatility 3 Wireshark Nmap PKI / OpenSSL Password Cracking Log Analysis Active Directory Entra ID
// Programming
Python C Bash / Shell Scapy inotify YAML / JSON Git
// Systems & Networking
Linux (Arch / Kali / Debian) QEMU / KVM OSPFv2 / RIPv2 Cisco Packet Tracer TCP/IP Btrfs Windows Forensics
// IAM & IT Ops
Identity Governance Access Management Incident Handling ITSM / Service Desk FTK Imager John the Ripper Hashcat VeraCrypt GPG

Work History

Mar 2026 — Present · Wrocław, Poland (Hybrid)
Identity Governance & Administration
Schaeffler
Working on IAM incidents and service requests — user accounts, access rights, identity system issues. Day-to-day involves monitoring and maintaining Active Directory and Entra ID, handling requests that come in, and making sure things don't quietly break. Also involved in process documentation and working with other IT teams on access compliance.
Oct 2022 — Mar 2026 · 3 yrs 5 mos · Kraków, Poland (Hybrid)
IT Service Desk
International Paper
First real IT job. Monitored the service desk and Digital Command Center, triaged incidents, and did first-line support for users across multiple countries. Learned to prioritize fast, escalate correctly, and stay calm when five things broke at once. Worked with both internal teams and external providers to get services back up.

What I've Built

Python
Lynx

A Linux HIDS daemon that watches the filesystem and running processes in real time.

  • inotify-based filesystem event monitoring
  • SHA-256 integrity checking against a saved baseline
  • Process monitoring — flags new root processes and deleted binaries
  • SUID binary tracking
  • Structured JSON logging, YAML config
Python
Network Intrusion Detection System

Live packet capture tool that detects port scans, SYN floods, ICMP sweeps, and DNS queries to known malicious domains. Pulls threat intel from Abuse.ch URLhaus on startup.

  • Port scan, SYN flood, ICMP sweep detection
  • DNS blocklist via Abuse.ch URLhaus (live feed)
  • Rich terminal UI, Pandas CSV logging
  • Built with Scapy on Linux
C
szsh

A Unix shell written in C. Mostly an exercise in understanding what actually happens when you type a command — fork, exec, wait, and all the plumbing between them.

  • Command parsing and execution
  • fork/exec process model
  • Built-in commands, I/O handling
Shell
syshealth

Bash utility for checking system health at a glance. CPU, memory, disk, network — plus threshold alerts when something looks off.

  • CPU, memory, disk, and network metrics
  • Threshold-based alerting
  • Clean terminal output
Shell
dotfiles

My personal config files with a Bash deployment manager. Catppuccin Mocha theme across Kitty and Neovim. More time goes into this than I'd like to admit.

  • Neovim setup with lazy.nvim
  • Automated deployment script
Python
password-manager

Simple CLI password manager in Python. Encrypted storage, key derivation, basic CRUD. Good exercise in applying crypto primitives to something that actually has to work.

  • Encrypted credential storage
  • CLI interface for CRUD operations
  • Secure key derivation

Education

2024 — Present · Wrocław, Poland
B.Eng. Cybersecurity (CBE)
Wrocław University of Science and Technology
Covers network security, OS security, PKI, digital forensics, and cryptography. A lot of lab work: Kali Linux, Wireshark, Volatility 3, Cisco Packet Tracer. The forensics and OS security courses have been the most useful so far.
Notable Labs
Security Coursework Highlights
Wrocław University of Science and Technology
Memory analysis with Volatility 3 (NTLM hash extraction, privilege escalation investigation) · PKI lab — built a local CA and signed personal certs with OpenSSL · Disk image acquisition with FTK Imager and ewfmount · Password cracking with John the Ripper and Hashcat · OSPFv2 and RIPv2 routing labs in Packet Tracer · Windows Security event log analysis

Certifications

Cisco Systems, Inc.
Python Essentials
2024
Regional Examination Board in Jaworzno
Professional Qualification EE.09
2022
Regional Examination Board in Jaworzno
Professional Qualification EE.08
2021

Get in Touch

I'm looking for junior roles and internships in cybersecurity — SOC, incident response, or security engineering. Also open to collaborating on security tooling or open source projects.