Skip to content
View PolakiniO's full-sized avatar

Block or report PolakiniO

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
PolakiniO/README.md

PolakiniO Logo Banner

Yuval Polak

Cybersecurity Engineer / Technical Lead

I build security tooling, harden production systems, and govern how AI behaves as an engineer in real environments.

Profile Views

Security in production is messy by default: interconnected systems, hidden dependencies, and one bad assumption away from failure.

I build, troubleshoot, harden, automate, and deliberately break systems until the weak spots show up.


About Me

  • Cybersecurity Technical Lead with 5+ years of hands-on engineering experience across technology, finance, government, defense, and other enterprise environments.
  • Focused on security architecture, engineering, and what really happens when controls meet production.
  • Deep into DLP, SSE, SASE, cloud security, detection engineering, endpoint protection, and BAS.
  • Used to operating in real enterprise environments across 50+ organizations, not isolated demo labs.
  • Strong bias for troubleshooting, root cause analysis, secure integration, and understanding system behavior under pressure.
  • I also build personal tools and side projects because good ideas usually start by solving annoying real problems.

Currently

I’m actively working across:

  • AI-assisted engineering workflows: turning AI from a coding helper into a governed engineering participant with reviewable behavior.
  • Security tooling and operational automation: building practical tools that improve reliability, visibility, and day-to-day security execution.
  • Platform/system thinking: designing with architecture, dependencies, failure modes, and long-term maintainability in mind.
  • Hands-on labs and applied learning systems: building environments where people learn through troubleshooting, validation, and repetition.
  • Research-oriented delivery: combining technical exploration with implementation so ideas become usable systems, not just notes.

This is where I create the most value: Technical Account Management (TAM), Security Engineering, and Security Research-focused roles.


Tech Stack

Python PowerShell Bash Docker AWS Kubernetes SQL Cloudflare Azure Linux Windows macOS


GitHub Stats

GitHub Stats Top Languages GitHub Streak


Projects

AI Engineering Logo

TL;DR: Governance layer for AI coding agents so implementation, refactoring, and reviews stay consistent, enforceable, and production-usable across repositories.

Built a governance framework that makes AI coding agents (such as Codex and similar tools) behave like disciplined senior engineers when interacting with a codebase.

Instead of ad-hoc prompts and inconsistent outputs, it introduces a reusable layer that standardizes implementation, refactoring, and code review across repositories.

Key capabilities:

  • Repository-level governance using AGENTS.md
  • Structured workflows via a portable playbook system
  • Reusable skill modules for consistent AI behavior
  • Enforced output structure for code reviews and implementations
  • Separation between generic governance and repo-specific logic
  • Support for multiple use cases (security workflows, backend services, data pipelines)
  • Presentation-ready output modes for demos and documentation
  • Designed to work across AI agents, tested primarily with Codex

Designed as a drop-in layer that can be adopted without modifying runtime code or introducing dependencies.

The project reflects a shift from using AI as a helper to treating it as an engineer operating within defined boundaries, contracts, and review standards.


HackQuest Academy Logo

TL;DR: Mobile-first offensive security training platform that turns learning into repeatable, interactive, game-like workflows.

Built a gamified offensive security learning platform in ~3 days, designed to make hands-on cybersecurity practice accessible directly from a mobile device and browser.

The project started from a simple question: can offensive security be practiced meaningfully from a phone? HackQuest Academy answers that by turning training into an interactive experience instead of a static lesson library.

Key capabilities:

  • Structured learning paths with progressive difficulty
  • Interactive challenges, quizzes, and CTF-style missions
  • Simulated terminal experience directly in the browser
  • Gamification system with XP, levels, streaks, and skill trees
  • Leaderboards and public user profiles
  • Completion certificates for learning tracks
  • Fully mobile-first design with no installation required
  • AI-assisted content generation and AI Tutor support
  • Feedback systems, issue reporting, and an internal AIFixLog improvement loop
  • Dynamic curriculum architecture for extending tracks without structural rewrites

The project reflects rapid prototyping, product thinking, and using AI to accelerate both development and content creation.


MacMountSMB Banner

TL;DR: Lightweight macOS utility that restores SMB mounts automatically and reduces user friction around sleep, VPN, and network transition failures.

Built a lightweight macOS utility that automatically restores SMB mounts, reducing disruptions caused by sleep, network changes, and VPN reconnects.

What began as a personal workaround evolved into a polished tool focused not only on reconnecting shares, but also on practical installation, day-to-day use, troubleshooting, and clean removal.

Key capabilities:

  • Automatic SMB reconnection with smart connectivity checks
  • Interactive and flag-based installation flows
  • Native macOS LaunchAgent integration
  • Finder and Keychain usage for secure credential handling
  • Runs fully in user space without sudo or system modifications
  • Clean uninstall with no leftover artifacts
  • Logging and debugging support for transparency and troubleshooting

The project highlights the shift from a script that works on one machine to a tool others can install, trust, and remove with confidence.


WTouch Banner

TL;DR: Native Windows touch alternative built for speed, Unicode correctness, and precise timestamp handling without WSL or external dependencies.

Built a lightweight native Windows alternative to the Linux touch command, eliminating the need to switch to WSL for simple file creation and timestamp operations.

The tool is primarily implemented in C++ with the Win32 API, with an emphasis on performance, full Unicode support, precise timestamp handling, and a standalone user experience.

Key capabilities:

  • Create new files or update timestamps on existing ones
  • Fine-grained control over access and modification times
  • Copy timestamps from reference files
  • Support ISO and POSIX-style timestamp formats
  • Work with files, directories, and Windows wildcards
  • Fully standalone operation with no external dependencies
  • Additional implementations in C, Python, and Bash for portability and simplicity

The development process also leveraged OpenAI Codex, requiring careful prompt engineering and precise requirement definition while building in a low-level language.


CyberFolio Banner

TL;DR: Interactive portfolio designed like an operating system to present technical work through both GUI and terminal-style navigation.

Built an interactive portfolio website that simulates a full operating system environment, creating a unique way to explore professional experience and projects.

CyberFolio combines a graphical desktop interface with a command-line experience, allowing users to navigate the portfolio in multiple ways, similar to a real OS.

Key capabilities:

  • Desktop-like environment with dynamic taskbar and draggable windows
  • Matrix-inspired background for a cyber-themed experience
  • Fully interactive GUI with resizable application windows
  • Built-in terminal for command-line navigation
  • Hybrid interaction model combining CLI and GUI
  • Included applications for About Me, Experience, Skills, Projects, Education, Certifications, Military Service, Contact Me, and an embedded web browser

The project focuses on creating a memorable user experience while showcasing technical skills, blending frontend development with system-inspired design.


K8S-zero-to-hero Banner

TL;DR: Troubleshooting-first Kubernetes lab repo built around failure analysis, verification, and repeatable operational practice.

Built a hands-on Kubernetes learning repository focused on real troubleshooting, progressive labs, operational repetition, and platform/security thinking instead of passive theory.

The project started as a personal knowledgebase and lab environment, then evolved into a structured public repo designed to teach Kubernetes the way it behaves in practice: through failure, debugging, verification, and repetition.

Key capabilities:

  • Structured Kubernetes notes and guided learning material
  • Progressive hands-on labs across core operations, networking, and deployment scenarios
  • Capstone exercises focused on platform, security, and verification workflows
  • Troubleshooting-first learning model built around proving failures and validating fixes
  • Supporting scripts and manifests for reproducible practice
  • Security and release guardrails for keeping the repository safe to maintain publicly
  • Public-facing documentation, contribution guidance, and repo hardening for open collaboration

The project reflects the same mindset I bring to security engineering: systems are understood best when you break them, observe them carefully, and explain exactly why they failed.


PolakiniO Banner

TL;DR: Profile repository treated as a living technical portfolio: real work, engineering context, and continuously maintained public signal.

Built my GitHub profile repository as a living technical portfolio that combines personal branding, engineering credibility, and project storytelling in one public-facing hub.

Instead of a minimal profile README, it is structured as a continuously maintained showcase covering professional focus, core technical stack, validated project work, and hands-on delivery mindset.

Key capabilities:

  • Structured profile architecture with clear sections for About, Tech Stack, Projects, Skills, and Mindset
  • Dynamic GitHub statistics and language/activity cards for transparent public signal
  • Project documentation style focused on practical outcomes, implementation details, and engineering tradeoffs
  • Consistent writing framework for turning technical work into portfolio-ready narratives
  • Integrated visual assets and badges for fast scanning and recruiter-friendly readability
  • Living update model with timestamped maintenance and continuous refinement

The repository reflects an approach to personal branding where technical communication, execution quality, and proof of work are treated as part of the engineering deliverable.


Skills

Security Engineering & Architecture

  • Secure architecture design
  • Detection engineering
  • DLP policy design and optimization
  • Breach and Attack Simulation (BAS)
  • Threat simulation and validation
  • Cloud security (AWS, SSE, SASE)
  • Security controls design and hardening

Automation, Scripting & Tools

  • Python
  • PowerShell
  • Bash / shell scripting
  • API integration and automation
  • Security tool development
  • Git / version control

Infrastructure, Systems & Networking

  • Enterprise networking and firewall architecture
  • Windows and Linux server administration
  • Virtualization (VMware)
  • Active Directory and enterprise services
  • Endpoint and network protection
  • Hybrid and on-prem environments

Implementation & Technical Delivery

  • Complex system integration
  • Technical troubleshooting and root cause analysis
  • High- and low-level design (HLD / LLD)
  • Technical documentation and architecture diagrams

Leadership & Collaboration

  • Technical project leadership
  • Engineering mentoring
  • Cross-functional collaboration
  • Professional services delivery

Mindset

  • Build things that solve real friction.
  • Security should survive contact with production.
  • If a tool looks good but fails under load, edge cases, or bad assumptions, it is not done.
  • Understanding behavior matters more than memorizing features.
  • I like systems you can trust, scripts that earn their keep, and troubleshooting that ends with a root cause.
  • If it works only in theory, it is not ready.

Contact / Connect

Open to my next challenge in technical security, TAM, and engineering-oriented roles - feel free to reach out.


// Last updated: 2026-04-04

Pinned Loading

  1. MacMountSMB MacMountSMB Public

    MacMountSMB is a lightweight macOS utility that keeps SMB network drives mounted automatically across sleep, reboots, and network changes.

    Shell 1

  2. WTouch WTouch Public

    WTouch is a native Windows implementation of the GNU touch command, enabling fast file creation and timestamp manipulation without WSL or environment switching.

    PowerShell 1

  3. AI-Engineering-Playbook AI-Engineering-Playbook Public

    Make AI coding agents behave like senior engineers - structured, consistent, and risk-aware by design.

    Shell 2

  4. K8S-Zero-To-Hero K8S-Zero-To-Hero Public

    Hands-on Kubernetes labs, notes, and troubleshooting exercises.

    Shell 1

  5. PolakiniO PolakiniO Public

    1