I am a backend developer interested in information security and system architecture, with hands-on experience in backend development and cloud infrastructure.
I focus on understanding how systems work internally and how security can be applied by design.
| Area | Skills |
|---|---|
| Backend | Spring Boot, REST API, Backend System Design |
| Database | MySQL, Redis, Schema Design |
| Cloud | AWS (EC2, RDS, S3), Docker |
| System | Linux, Networking basics |
| Testing | API Testing, Postman, Swagger |
| Development | Bug fixing, Debugging |
| Documentation | Technical Documentation |
| Collaboration | GitHub Project Management |
Available for freelance and remote technical support opportunities.
Backend Development | Cloud Infrastructure | System Architecture | Security Engineering
π GitHub Repository
https://github.com/SMWU-2025-02-Network/2025-02-Network-Server
Backend system integrating seat management, real-time chat, and sensor monitoring.
β Designed TCP socket communication server
β Implemented multi-thread architecture
β Built real-time message routing system
β Designed seat management logic
β Applied role-based access control
π GitHub Repository
https://github.com/SoluxteamMerge/30th_1_Merge_UniTrip_Backend
REST API based travel service backend.
β Developed REST APIs
β Designed database schema
β Built AWS deployment environment
β Implemented authentication features
π GitHub Repository
https://github.com/sm-solux/30th_2_solux_Actionary_back
All-in-one productivity platform for habit and study management.
β Led project planning and team coordination
β Developed backend APIs
β Supported AWS infrastructure setup
β Managed GitHub collaboration workflow
π GitHub Repository
https://github.com/q-n-b/BackEnd
Backend service integrating ML recommendation and cloud infrastructure.
β Built backend server architecture
β Designed AWS infrastructure
β Integrated ML server API
β Implemented internal API authentication
π GitHub Repository
https://github.com/dahyeon1216/2025_2_system_security
Security project analyzing attack techniques and implementing defense logic.
β Reverse engineered authentication logic
β Designed attack simulation programs
β Implemented defense detection logic
β Improved detection rate through behavior analysis

