Philipp MR.
Cybersecurity EnthusiastSKILLS
CompTIA Security+
Google Cybersecurity
Academic Background
Education
Apr 2025 β present
Heidelberg University π©πͺ
M.Sc. Data and Computer Science
- Heidelberg Master TBD
Sep 2025 β May 2026
California State University Northridge πΊπΈ
Computer Science Exchange
- Advanced network Topics
- Network Infrastructure
- Cloud Computing
Feb 2025 β May 2025
Universidad Politechnica de Madrid πͺπΈ
Computer Science Exchange
- Data Mining
- Software design
- Software Quality assurance
Oct 2021 β Apr 2025
Heidelberg University π©πͺ
B.Sc. Computer Science
- IT Security 1 and IT Security 2
- Operating Systems and Networks
- Algorithms and datastructures
Feb 2024 β Jul 2024
Charles University π¨πΏ
Computer Science Exchange
- Probability and statistics
- Artificial Intelligence
- Microeconomics
Work History
Experience
Jun 2025 β Feb 2026
OpenTicketAI
Freelance Software Developer (AI / ML)
- Design and optimization of ML models for classifying large datasets, including preprocessing, feature engineering, and evaluation
- Analysis and structuring of complex requirements in close collaboration with clients and stakeholders
- Part-time project-based work for an AI startup developing AI-powered software solutions for automating customer service processes
Featured Work
Projects
- Researched and implemented Machine Learning models to detect sophisticated network attacks on QUIC servers.
- Developed custom scripts to simulate adversarial traffic and analyze encrypted protocol patterns in an experimental setup.
- Focused on identifying protocol-specific anomalies and validating detection accuracy across various attack scenarios.
- Developed a modular benchmarking platform for various QUIC implementations (QUINN, MSQUIC) vs TCP.
- Programmed server/client responses to evaluate throughput and resource usage under simulated disturbances.
- Automated network simulation using Linux 'tc' for measuring the effects of delay, packet loss, and reordering.
- Deployed an Azure-based honeypot (Windows 11) capturing 2,190+ automated brute-force login attempts within hours.
- Utilized Microsoft Sentinel and Log Analytics to aggregate and hunt security events using Kusto Query Language (KQL).
- Enhanced log data with Geolocation enrichment and built an interactive Attack Map for real-time visualization of global threat actors.
Thoughts & Insights