Core Objective: A deep-dive network analysis
focusing on LAN protocol integrity. By leveraging Wireshark to process and analyze
multi-terabyte datasets, the project successfully identified critical anomalies, infrastructure
gaps, and high-level optimization points.
Technical Milestones
Traffic Ingestion: Analyzed high-volume traffic flows
including HTTPS, TCP/UDP handshakes, and proprietary enterprise protocols.
Bottleneck Isolation: Implemented advanced display and
capture filters to pinpoint latency and throughput issues across hybrid environments.
Architectural Mapping: Delivered precise documentation
bridging the gap between logical protocol layers and physical hardware boundaries.
Pattern Recognition: Engineered dynamic security policies
derived from raw packet metadata and heuristic traffic flow patterns.
This analytical framework proved crucial for validating Zero-Trust assumptions and ensuring
long-term software reliability through rigorous hardware-level verification.
4 years of engineering resilient, high-stakes infrastructure. I don't just write code — I
architect the technology that protects your assets and scales your vision.
Python
Daemon→Node.js
Orchestrator→DOM
Parser→Data
Store
Architecture
Distributed multi-process
daemons with async job queues
DOM
Strategy
Custom parsing pipeline
tuned per-retailer schema
Anti-Bot
Layer
Proprietary bypass for JS
challenges, fingerprinting & rate limiting
02 —
Revenue Stack
Unit Economics
Dual-pipeline monetisation
B2CStripe
Full-cycle subscription
API — checkout, webhooks, cancellation & billing portal
B2B
AmazoneBay
Automated affiliate
pipelines with dynamic link injection & commission tracking
03 —
Security Boundary
Enterprise Security & IP
Protection
Proprietary scraping logic, request-routing topology, and anti-detection heuristics
are maintained in private, access-controlled enterprise repositories — intentionally
excluded from public portfolio exposure.
Private
RepoAccess-ControlledNDA
Scope
Experience & Certifications
2026 — Present
Founder &
Lead Architect
@ RigRadarAI
Live
Architected and scaled an autonomous hardware deal-scraping SaaS. Transitioned from
zero to full product ownership, handling backend scraping infrastructure and
dual-revenue billing pipelines.
Maintaining 980+ commits in
highly secure, private B2B repositories.
2026
Independent Software
Contractor (OSVČ)
B2B & Revenue Infrastructure
Established official independent contracting infrastructure to support complex web
monetization, specifically integrating Stripe B2C APIs and automated B2B affiliate
pipelines.
2022 — 2025
Freelance Web Developer
& Network Analyst
Independent Client Work
Delivered corporate web solutions and IT infrastructure for B2B clients (including
Oresi). Specialized in rapid CMS deployments, UI/UX heatmapping, and deep-level LAN
network analysis using Wireshark.
Credentials
Certifications
AI
& Governance2025
Advanced AI Implementation &
Automation
NetMate CZ — Practical certification in
ChatGPT automation, AI agents, and secure enterprise AI deployment.
Languages2025
B2 First (FCE) Professional
English
Cambridge Assessment — Certified professional
working proficiency (Overall Score: 168).
Frontend2024
Frontend Web Development &
CMS Architecture
Skillmea — Comprehensive deep-dive into
JavaScript, HTML, CSS infrastructure, and WordPress deployment.
Built to replace the bloat of WordPress with pure engineering. Sylenar turns raw visual
sketches into clean HTML DOM trees, offering a streamlined, high-performance alternative
to traditional WordPress builders. Faster workflow, zero compromises.
Vanilla
JSCanvas
APIDOM
Builder
NoReason s.r.o.
Full ICT
Corporate Presentation
Live
Demo
Booking System
Reservation Calendar Frontend
View Case
Logomanual
Interactive Brand Guidelines
View Case
2024 — UI/UX & Data Analytics
Květinářství UI/UX
Artisan-grade digital architecture. From raw charcoal sketches to a high-conversion,
fluid-responsive brand experience.
Explore Website
Network
Analysis
Terabyte Metadata
Advanced network architecture assessment using Deep Packet Inspection (DPI).
Optimizing LAN protocols and enforcing Zero-Trust security boundaries across complex
hybrid environments.