Skip to main contentSkip to navigation

Initializing Security Portfolio...

Kino - Cybersecurity Engineer, Security Architecture, Product Management

Kino

Cybersecurity Engineer, Security Architecture, Product Management

I'm a cybersecurity professional with expertise in security engineering and automations, architecture, and product management. I specialize in building secure systems, conducting risk assessments, and leading security R&D initiatives to protect organizations from evolving threats.

Zero TrustSecurity EngineeringRisk AssessmentSecurity AutomationSecurity ArchitectureDevSecOpsSecurity R&DSecurity InnovationNIST CSFCISOWASPMITREThreat ModelSecurity Product ManagementCybersecurity Mesh

About Me

I'm a cybersecurity professional with expertise in security engineering and automations, architecture, and product management. I specialize in building secure systems, conducting risk assessments, and leading security R&D initiatives to protect organizations from evolving threats.

Location

Manila, Philippines

Experience

13+ Years

Focus

Cybersecurity & Security Engineering

RSA Conference, San Francisco
RSA Conference, San Francisco

My Experience

Professional journey in cybersecurity and technology

Globe Telecom Logo

Head, Security Engineering & Automation

Globe Telecom
2025 - Present

Leading security automation initiatives across enterprise systems, designing secure cloud infrastructures, and establishing security DevOps. Managing cross-functional teams to implement secure by default and DevSecOps processes.

AWS SecurityGCP SecurityPythonTerraformGitlabJFrog ArtifactoryJFrog XrayCloudflareTraceableCheckovJit SecuritySplunkSemgrepGosecBanditGitleaksTrufflehogOSV-Scannernpm-auditTrivyNancySyftProwlerKubescapeZap
Globe Telecom Logo

Head, Security R&D and Product Management

Globe Telecom
2024 - 20251 year

Managed security product technology roadmap, conducted market research and analysis for new security tools, and collaborated with architecture and engineering teams to develop technical security architecture blueprint for security solutions. Led security R&D initiatives for proof-of-concepts and manage security tools operational business benefits for renewal and utilization of licenses.

CrowdStrikePalo Alto NetworksOktaSailPointSplunkJit SecurityCloudflareTraceableCyberArkTaniumEntrustPenteraZimperiumArborGigamonGuardicoreVectraCanaryTenableFortinetMobileumBlanccoMaterial SecuritySecuPiUbiq SecuritySecuritiOvalEdgeForescoutOneTrustYubicoSlashNext
Globe Telecom Logo

Security Architect

Globe Telecom
2021 - 20243 years

Implemented security controls, conducted security risk assessments, and developed security architecture design and blueprints. Performed security risk assessments on critical infrastructure systems.

Threat ModelingSecurity Design ReviewSecurity ArchitectureSecurity Implementation PlanSecurity Risk AssessmentSecurity ResearchSecurity Analysis
Globe Telecom Logo

Lead Solution Designer

Globe Telecom
2019 - 20212 years

Overall Lead of Solution Design and Implementation for Globe Telecom's Digital Applications, end-to-end software development and lifecycle delivery. From planning, design, development, testing, deployment, and maintenance.

GlobeOne ProgramDGT-SuperApp
Globe Telecom Logo

Solution Designer

Globe Telecom
2016 - 20193 years

Solution Design and Implementation for Globe Telecom's Enterprise Applications, end-to-end software development and lifecycle delivery. From planning, design, development, testing, deployment, and maintenance.

1GIE (Pilot)CIAM SSOBroadband Data CapContent Broadband whitelisting campaignAdobe Experience ManagerVolume Boost Automation
Globe Telecom Logo

Systems Analyst

Globe Telecom
2012 - 20164 years

Vendor employee deployed in Globe as a Subject Matter Expert for Globe Telecom's Enterprise Applications, end-to-end software development and lifecycle delivery. From planning, design, development, testing, deployment, and maintenance.

GoSaktoiPhone Ordering SystemMyAccount PortalRoaming Notification ServiceGlobe Business Accounts PortalT-Mobile Easy Plan
Globe Telecom Logo

QA Analyst

Globe Telecom
2012 - 2012

Vendor employee deployed in Globe as a QA Analyst for Globe Telecom's Enterprise Applications, quality assurance testing design and analysis, test cases, test plans, test reports, and test results.

SMS unli textSMS broadcasterMobile RoamingTM unli textTM mobile roaming
Axiom xCell Logo

QA Analyst

Axiom xCell, Inc.
2010 - 20122 years

QA Analyst for mobile applications developement, quality assurance testing design and analysis, test cases, test plans, test reports, and test results.

iOSAndroidQualcommBREW mobile eco-systemMantis Bug TrackerMobile App Testing

My Skills

Security Architecture

Zero Trust Architecture
Threat Modeling
Security Frameworks
IAM & Identity Security
Cloud Security
Security Risk Assessment

Security Engineering

DevSecOps
Penetration Testing
Vulnerability Management
SIEM/SOAR
Network Security
Cryptography
Digital Forensics

Programming & Automation

Python Logo
Python Security
Typescript Logo
Typescript
Bash Scripting
GitLab Logo
GitLab
GitHub
Terraform Logo
Terraform
AWS Logo
AWS
GCP Logo
GCP
Docker Logo
Docker
Kubernetes Logo
Kubernetes
VSCode Logo
Vscode

Security Tools & Platforms

Burp Suite Logo
Burp Suite
Nmap Logo
Nmap
Metasploit Logo
Metasploit
Wireshark
OWASP ZAP Logo
OWASP ZAP
OSS
Cloudflare Logo
Cloudflare
Splunk Logo
Splunk
Traceable Logo
Traceable
Checkov Logo
Checkov
Jit Security Logo
Jit Security
JFrog Logo
JFrog

Compliance & Governance

NIST CSF
CIS
ISO 27001
SOC 2
GDPR Compliance

My Projects

Open source projects from GitHub and GitLab showcasing my expertise in cybersecurity tools, AI/ML, DevOps automation, and full-stack development

ai
ai
Featured

Kino MCP Project

A simple Model Context Protocol (MCP) implementation featuring a secure FastMCP server with OAuth 2.0 authentication and a modern React frontend. This project demonstrates how to build authentication features when AI assistant tools like Claude Code authenticate user management before using the MCP tools.

PythonFastMCPOAuth 2.0ReactSQLAlchemyStytchAI IntegrationAuthentication
ai
ai
Featured

AI Agent with Calculator & File Operations

Comprehensive Python-based AI agent featuring calculator functionality, file operations, and Python code execution capabilities. Built with modular design and comprehensive documentation following Python best practices.

PythonAI/MLFile OperationsCalculatorModular DesignTest Suite
other
other
Featured

Downloads Folder Organizer

Robust Python script that automatically organizes Downloads folder by categorizing files into appropriate directories. Features smart duplicate handling, comprehensive logging, and support for 25+ file types with Pylint-compliant code.

PythonFile ManagementAutomationLoggingError HandlingPylint
game
game
Featured

Asteroids Game

Python implementation of the classic Asteroids arcade game using Pygame. Features player ship controls, shooting mechanics, destructible asteroids, score system, and screen wrapping for authentic arcade experience.

PythonPygameGame DevelopmentObject-Oriented ProgrammingGraphics
other
other

BookBot Text Analyzer

My first Boot.dev project - a Python text analysis tool for processing and analyzing book content. Built as part of learning fundamental programming concepts and file operations.

PythonText ProcessingFile I/OData Analysis
web
web
Empty

WebFlyx

Sample project repository only.

JavaScriptHTMLCSSWeb DevelopmentUI/UX
other
other

VSCode Git Integration Tool

Development tool built with HTML and JavaScript to enhance Git workflow integration within Visual Studio Code. Focuses on improving developer productivity and version control management.

HTMLJavaScriptGitVSCode ExtensionsDeveloper Tools
other
other
Empty

Kubernetes Infrastructure Management

Infrastructure as Code project focused on Kubernetes cluster management and container orchestration. Demonstrates cloud-native development and DevOps practices.

KubernetesContainer OrchestrationDevOpsInfrastructure as CodeCloud Native
other
other
Private

Security Risk Assessment Platform (PSRA)

Private security project focused on automated risk assessment and compliance monitoring. Demonstrates advanced security engineering and risk management capabilities.

Security AssessmentRisk ManagementComplianceAutomationSecurity Engineering
other
other
Private

Firewall Management System

Private security infrastructure project for advanced firewall configuration and management. Showcases network security expertise and automated security controls implementation.

Network SecurityFirewall ManagementSecurity AutomationInfrastructure Security
other
other
Private

Demand Prioritization System

Private business intelligence tool for analyzing and prioritizing organizational demands and requirements. Built for strategic planning and resource allocation optimization.

Business IntelligenceData AnalysisStrategic PlanningResource Management
web
web
Private

Cura Healthcare Platform

Private JavaScript application focused on healthcare management solutions. Demonstrates full-stack development capabilities in the healthcare technology sector.

JavaScriptHealthcare TechnologyFull-Stack DevelopmentUI/UXData Management
web
web

First Learning Project

Initial JavaScript project created during my programming learning journey. Represents foundational web development skills and early exploration of modern JavaScript frameworks.

JavaScriptLearning ProjectWeb DevelopmentFrontend Basics
other
other
Featured

Hadolint - Dockerfile Security Linter

A Dockerfile linter that helps developers write secure, efficient, and maintainable Dockerfiles. It detects syntax errors, enforces best practices, and integrates with ShellCheck to validate shell scripts in RUN commands.

DockerSecurityLintingShell ScriptingDevOpsCI/CD
other
other
Featured

Terraform Drift Detection

Infrastructure monitoring tool that detects configuration drift in Terraform-managed resources. Helps maintain infrastructure integrity by identifying unauthorized changes and ensuring compliance with defined infrastructure as code.

TerraformInfrastructure as CodeMonitoringDevOpsCloud Security
ai
ai
Featured

Cybersecurity AI News Aggregator

AI-powered news aggregation system for cybersecurity intelligence. Automatically collects, analyzes, and categorizes cybersecurity news and threat intelligence from multiple sources to keep security professionals informed.

AI/MLNews AggregationCybersecurityThreat IntelligenceData Processing
other
other
Private
Featured

PII Detection System

Advanced privacy protection tool that automatically detects and classifies Personally Identifiable Information (PII) in documents and data streams. Essential for GDPR compliance and data privacy protection.

PrivacyPII DetectionData ClassificationComplianceSecurity
other
other
Private

PSRA Security Framework

Comprehensive security framework and toolkit for enterprise security operations. Provides reusable security components and utilities for building secure applications and systems.

Security FrameworkEnterprise SecuritySecurity ComponentsDevSecOps
game
game
Private

Cyber TCG - Cybersecurity Trading Card Game

Educational cybersecurity trading card game that teaches security concepts through interactive gameplay. Combines learning with entertainment to make cybersecurity education more engaging.

Educational GamingCybersecurity EducationGame DesignInteractive Learning
other
other
Private

X-Ray Confidence Scanner

Security scanning tool that provides confidence scoring for vulnerability assessments. Enhances traditional security scanning by adding contextual risk analysis and confidence metrics.

Vulnerability ScanningRisk AnalysisSecurity AssessmentConfidence Scoring
other
other
Private

GitLab Notification System

Custom notification system for GitLab workflows and CI/CD pipelines. Provides enhanced alerting and monitoring capabilities for DevOps teams using GitLab infrastructure.

GitLab IntegrationNotificationsCI/CDDevOpsWorkflow Automation
other
other
Private

Enterprise Private Security Initiative

Private enterprise security project focused on advanced threat detection and response capabilities. Demonstrates cutting-edge security technologies for organizational protection.

Enterprise SecurityThreat DetectionAdvanced SecurityPrivate Development
other
other
Private

Demand Prioritization Analytics (GitLab)

GitLab version of the demand prioritization system with enhanced CI/CD integration. Provides strategic planning and resource allocation optimization with automated deployment capabilities.

Business IntelligenceGitLab CI/CDStrategic PlanningAnalyticsAutomation

My Achievements

Recognitions and milestones in my cybersecurity journey

Detecting Threats with AI

2025

Invited by Globe Business to deliver a session on empowering MSMEs in the Philippines through AI-driven threat detection and cybersecurity innovation

Achievement

Hackathon Speaker

2025

Invited to speak at Globe Telecom's CodeToCareer hackathon, empowering participants through insights on AI and cybersecurity innovation, and fostering talent in coding and cloud technologies.

Achievement

Cybersecurity Speaker

2024

Invited by Globe B2B Enterprise team for a Cybersecurity Enablement and Immersion session to share insights and expertise in enterprise security architecture, highlighting industry best practices and emerging threats

Achievement

API Security Event

2023

Invited as a speaker for Nexus & Traceable's API Security Event to discuss best practices and insights on API security, addressing an audience of enterprise professionals

Achievement
CEH Badge

CEH Certification

2023

Certified Ethical Hacker (CEH) – EC-Council certification validating proficiency in ethical hacking, penetration testing, and cybersecurity defense.

Certification
ISC2 Badge

CC Certification

2024

Certified in Cybersecurity - ISC² certification

Certification
Click to view

CVE Discovery

2025

Discovered and reported 2 Critical CVEs in enterprise software, contributing to global security

Achievement
Google Cybersecurity Badge

Google Cybersecurity Specialization

2023

Completed Google Cybersecurity Specialization on Coursera, mastering networks, detection & response, Linux, SQL, and automation of cybersecurity tasks using Python

Certification
Click to view
NIST CSF Badge

NIST CSF Lead Implementer

2023

Certified Lead Implementer for NIST Cybersecurity Framework (CSF), demonstrating expertise in establishing, managing, and optimizing cybersecurity programs.

Certification
Click to view
DevOps Badge

DevOps Foundation Certification

2020

Certified by DevOps Institute, demonstrating proficiency in DevOps principles, practices, automation, and continuous integration/delivery (CI/CD).

Certification
AWS Badge

AWS Certified Cloud Practitioner

2022

Certified by Amazon Web Services (AWS), validating expertise in cloud fundamentals, AWS cloud infrastructure, security, and services.

Certification
Click to view
Google Cloud Badge

Google Cloud CI/CD

2024

Earned the intermediate skill badge from Google Cloud, demonstrating expertise in Artifact Registry, Cloud Build, Cloud Deploy, and continuous integration pipeline security.

Certification
Click to view
LFD121 Badge

Developing Secure Software (LFD121)

2024

Earned the Linux Foundation badge demonstrating knowledge in developing and maintaining secure software to counter cyber threats and rapidly address vulnerabilities.

Certification
Click to view
LFEL1007 Badge

Automating Supply Chain Security (LFEL1007)

2024

Earned Linux Foundation badge validating skills in leveraging open-source tools to secure software supply chains, including SBOM generation and artifact signing

Certification
Click to view
LFS180 Badge

Introduction to DevSecOps for Managers (LFS180)

2024

Earned Linux Foundation badge highlighting understanding of DevSecOps principles, platform optimization, cybersecurity fundamentals, and secure software delivery practices.

Certification
Click to view
Boot.Dev Logo

Boot.Dev - Learn to Code in Python

2025

Completed comprehensive Python programming course on Boot.Dev, mastering fundamental programming concepts, data structures, and algorithms.

Boot.Dev
Click to view
Boot.Dev Logo

Boot.Dev - Learn Object Oriented Programming in Python

2025

Mastered object-oriented programming principles in Python, including classes, inheritance, polymorphism, and design patterns.

Boot.Dev
Click to view
Boot.Dev Logo

Boot.Dev - Learn Linux

2025

Completed Linux fundamentals course, gaining proficiency in command line operations, file systems, and system administration.

Boot.Dev
Click to view
Boot.Dev Logo

Boot.Dev - Learn Kubernetes

2025

Mastered container orchestration with Kubernetes, including deployment, scaling, and management of containerized applications.

Boot.Dev
Click to view
Boot.Dev Logo

Boot.Dev - Learn Git

2025

Completed Git version control course, mastering branching strategies, merge conflicts, and collaborative development workflows.

Boot.Dev
Click to view
Boot.Dev Logo

Boot.Dev - Learn Functional Programming in Python

2025

Explored functional programming paradigms in Python, including lambda functions, map/filter/reduce, and functional design patterns.

Boot.Dev
Click to view
Boot.Dev Logo

Boot.Dev - Learn Docker

2025

Mastered containerization with Docker, including image creation, container management, and Docker Compose for multi-container applications.

Boot.Dev
Click to view
Boot.Dev Logo

Boot.Dev - Build an AI Agent in Python

2025

Completed advanced project building an AI Agent with calculator functionality, file operations, and Python code execution capabilities.

Boot.Dev
Click to view
Boot.Dev Logo

Boot.Dev - Build a Bookbot in Python

2025

Developed a Python text analysis tool for processing and analyzing book content, demonstrating file I/O and text processing skills.

Boot.Dev
Click to view
Boot.Dev Logo

Boot.Dev - Build Asteroids using Python and Pygame

2025

Created a complete implementation of the classic Asteroids game using Python and Pygame, showcasing game development skills.

Boot.Dev
Click to view
Boot.Dev Logo

Boot.Dev - Grandmaster: Sharpshooter

2025

Achieved Grandmaster level by completing 28 sharpshooter sprees, demonstrating exceptional coding accuracy and consistency.

Boot.Dev
Click to view
Boot.Dev Logo

Boot.Dev - Master: Milestone

2025

Reached Master level by completing 480 exercises, showcasing dedication to continuous learning and skill development.

Boot.Dev
Click to view
Boot.Dev Logo

Boot.Dev - Platinum: Streak

2025

Achieved Platinum streak by studying consistently for 34 days, demonstrating commitment to daily learning and improvement.

Boot.Dev
Click to view
Boot.Dev Logo

Boot.Dev - Bronze: Fellowship

2025

Earned Bronze Fellowship by contributing to the Boot.Dev community and earning karma in the Discord community.

Boot.Dev
Click to view
Boot.Dev Logo

Boot.Dev - Level 67 Achievement

2025

Reached Level 67 on Boot.Dev with 763 XP, demonstrating significant progress in programming skills and course completion.

Boot.Dev
Click to view
Boot.Dev Logo

Boot.Dev - 658 Lessons Solved

2025

Completed 658 lessons on Boot.Dev, showcasing comprehensive engagement with programming curricula and problem-solving skills.

Boot.Dev
Click to view

Embedded Jit Security for Scalable Application Security Orchestration

2025

Led the enterprise integration of Jit.io, a CI/CD-native application security orchestration platform, to enforce policy-as-code, automate vulnerability scanning, and embed security directly into developer workflows. This elevated secure coding practices while minimizing friction across GitLab pipelines.

Contribution

Accelerated Time-to-Market with Secure Deployment Automation

2025

Contributed in the architecture and implemented secure git-based automation for deploying Marketing campaign landing page, integrating security scans and Cloudflare self-service in the GCP edge delivery. Enabled Marketing teams to independently launch HTML/CSS/JS content securely - achieving same-day go-lives with built-in guardrails and no manual approvals.

Contribution

Cross-Team Enablement through Reusable Secure Pipelines

2025

Provided support and guidance in developing and distributing production-ready CI/CD workflows embedded with controls across JFrog and AdGitOps pipelines. This empowered teams across Engineering, Security, and Business Units to adopt a shared DevSecOps foundation with minimal onboarding overhead.

Contribution

Eliminated Security Gaps with Policy-Driven Enforcement

2025

Enabled security controls including TLS version enforcement, secrets detection, Dockerfile hardening, and OWASP checks - ensuring merge-time validation. Reduced high-severity vulnerabilities reaching staging and production by proactively addressing them earlier in the pipeline as part of the security scanners activation out-of-the-box.

Contribution

Championed Shift-Left Security Culture with Developer-First UX

2025

Enabled real-time feedback loops via integrations and GitLab inline comments, transforming static security scans into actionable developer guidance. Fostered greater ownership of security across teams and improved overall security posture without impeding velocity. This resulted in closer collaboration and support between the IT Platform Engineering, AWS Tribe, GCP Tribe, SOC Vulnerability team, Application Developers, and Security Engineering cross-functional teams. It translated to good developer feedback that praises our support and efforts.

Contribution

Personal Insights

What drives you as a cybersecurity professional?

I'm driven by the mission to protect organizations and individuals from cyber threats. Every security solution I architect is a shield against potential attacks that could cause real harm. The constantly evolving threat landscape keeps me motivated to stay ahead of adversaries.

How do you approach security risk assessment?

I believe in a methodical, threat-modeling approach. I start by identifying critical assets, analyze potential attack vectors, assess the likelihood and impact of threats, and then design layered security controls. It's about thinking like an attacker while building like a defender.

What's your philosophy on security architecture?

Security should be built into the foundation, not bolted on as an afterthought. I advocate for 'security by design' principles - zero trust architecture, least privilege access, and continuous monitoring. The goal is to create systems that are resilient and can adapt to emerging threats.

How do you stay current with cybersecurity trends?

The threat landscape evolves daily, so I maintain active engagement with the security community through threat intelligence feeds, security conferences like RSAC, DEF CON, Black Hat, and GovWare, research publications, and hands-on experimentation with new attack techniques and defensive tools.

What's your approach to security team leadership?

I believe in fostering a culture of security awareness and continuous learning. I mentor team members to think critically about security challenges, encourage responsible disclosure of vulnerabilities, and promote knowledge sharing across the organization. Security is everyone's responsibility.

Where can I read your published articles and thought leadership pieces?

Get In Touch

Contact

Contact Information

Feel free to reach out for collaboration opportunities, questions, or just to say hello!

I also offer comprehensive cybersecurity services including security risk assessments, cybersecurity strategy planning, business consulting, threat modeling, security architecture design, DevSecOps implementation, compliance frameworks (NIST CSF, ISO 27001), and other specialized services based on my 13+ years of experience in security engineering and product management.

Manila, Philippines🇵🇭

0/2000

By submitting this form, you agree to our Privacy Policy and Terms of Service. Your personal information will be used solely to respond to your inquiry and will be handled in accordance with applicable privacy laws.