Security-minded systems operator and tool builder focused on offensive security, AI security, Linux and macOS systems, and practical automation.
I enter unfamiliar systems, map how they work, identify what matters, and organize them so teams do not get lost.
- Operator-focused command-line tooling
- Linux and macOS systems automation
- SSH, server, and VM operations tooling
- Media-processing pipelines
- Repo hygiene and inventory tools
- Security-focused experiments and workflows
Most of my repositories remain private while they are security-sensitive, local, or personal in nature. Public repositories here are intentionally cleaned, standardized, and ready to share.
- AI security and LLM application security
- Offensive security practice, methodology, tooling, and home-lab work
- Linux and macOS administration across VMs, cloud servers, and personal infrastructure
- Standardizing command-line tooling, repo hygiene, and environment-audit workflows
- Preparing selected private tools for public release through security review and documentation
- Fundamentals first
- Light kit, heavy skill
- Make systems inspectable
- Quick execution, meticulous standards
- Prefer boring, readable code
- Build tools that explain where they live and what they do
- Hardware-level security research and embedded systems
- Social engineering as an offensive security testing discipline
- Taking systems apart to understand how they work, then rebuilding or modifying them with intent
- Signal capture, transmission behavior, and exploring what is observable in the air
- Quiet movement through systems: observe, understand, document, and leave cleanly
I build systems, then make them inspectable.
I document what matters.
I standardize what repeats.
I maintain what I depend on.
I audit my environments.
I turn repeated friction into tooling.
Systems engineering.
Security mindset.
Operator DNA.
Broen Westberg
Security practitioner · systems operator · tool builder
