Philipp MR.

Cybersecurity Enthusiast
Read Blog
SKILLS
Python Skilled
Bash Professional
Wireshark Professional
Security Concepts Professional
C++ Intermediate
Network Protocols Professional
English Professional
Flutter Skilled
CompTIA Security+
Google Cybersecurity

Education

Apr 2025 – present

Heidelberg University πŸ‡©πŸ‡ͺ

M.Sc. Data and Computer Science
  • Heidelberg Master TBD
Sep 2025 – May 2026

California State University Northridge πŸ‡ΊπŸ‡Έ

Computer Science Exchange
  • Advanced network Topics
  • Network Infrastructure
  • Cloud Computing
Feb 2025 – May 2025

Universidad Politechnica de Madrid πŸ‡ͺπŸ‡Έ

Computer Science Exchange
  • Data Mining
  • Software design
  • Software Quality assurance
Oct 2021 – Apr 2025

Heidelberg University πŸ‡©πŸ‡ͺ

B.Sc. Computer Science
  • IT Security 1 and IT Security 2
  • Operating Systems and Networks
  • Algorithms and datastructures
Feb 2024 – Jul 2024

Charles University πŸ‡¨πŸ‡Ώ

Computer Science Exchange
  • Probability and statistics
  • Artificial Intelligence
  • Microeconomics

Experience

Jun 2025 – Feb 2026

OpenTicketAI

Freelance Software Developer (AI / ML)
  • Design and optimization of ML models for classifying large datasets, including preprocessing, feature engineering, and evaluation
  • Analysis and structuring of complex requirements in close collaboration with clients and stakeholders
  • Part-time project-based work for an AI startup developing AI-powered software solutions for automating customer service processes

Projects

Detection of QUIC Attacks Using Machine Learning

  • Researched and implemented Machine Learning models to detect sophisticated network attacks on QUIC servers.
  • Developed custom scripts to simulate adversarial traffic and analyze encrypted protocol patterns in an experimental setup.
  • Focused on identifying protocol-specific anomalies and validating detection accuracy across various attack scenarios.

Benchmarking the QUIC Protocol

  • Developed a modular benchmarking platform for various QUIC implementations (QUINN, MSQUIC) vs TCP.
  • Programmed server/client responses to evaluate throughput and resource usage under simulated disturbances.
  • Automated network simulation using Linux 'tc' for measuring the effects of delay, packet loss, and reordering.

Cloud SOC Attack Map Lab

  • Deployed an Azure-based honeypot (Windows 11) capturing 2,190+ automated brute-force login attempts within hours.
  • Utilized Microsoft Sentinel and Log Analytics to aggregate and hunt security events using Kusto Query Language (KQL).
  • Enhanced log data with Geolocation enrichment and built an interactive Attack Map for real-time visualization of global threat actors.

Latest Articles