Francesco Pompo'
Security Developer
Location: Turin, Italy
Email: contact@francesco.cc
Website: francesco.cc
Github: github.com/deade1e
About Me
Security developer with over 10 years of experience in the IT security industry, specializing in low-level programming and malware analysis.
Skilled in both offensive and defensive security, with expertise ranging from red teaming tool development to SOC incident response.
Notable contributions include a Linux kernel patch, an asynchronous network scanner in Rust and a Tor protocol re-implementation.
Work Experience
Lead Security Developer | 7Layers S.r.l. | Turin, Italy
March 2022 – December 2024
- Developed tools to improve team workflow efficiency
- Performed malware analysis through reverse engineering to extract IoCs
- Managed multiple IoC flows and their distribution across environments
- Coordinated two junior resources
Senior Security Analyst | 7Layers S.r.l. | Turin, Italy
November 2020 – March 2022
- Handled L3 security incidents
- Organized training sessions for teams
- Performed malware analysis in low and high-level languages
- Developed workflow automation tools
Senior Security Developer | Novanext S.r.l. | Turin, Italy
March 2020 – November 2020
- Developed and maintained intelligence collection and distribution system
- Created Early Warning service for customers
- Coordinated two junior resources
Splunk Developer | Consoft S.p.a. | Turin, Italy
September 2019 – March 2020
- Developed Python integrations for Splunk interactions
- Configured dashboards for Splunk Enterprise Security
Red Team Developer | eSurv S.r.l. | Catanzaro, Italy
April 2017 – February 2019
- Developed low-level interception tools in C and Assembly for Windows, Linux, and MacOS for Italian prosecutor offices
Independent Security Researcher | Self Employed | Italy
August 2015 – April 2017
- Developed Lor (Light Onion Router), a Tor re-implementation in C using MbedTLS
- Wrote security-related articles
Junior Security Developer | TS-Way S.r.l. | Orvieto, Italy
August 2014 – August 2015
- Developed intelligence collection and analysis tools in Node.JS and PHP
- Performed malware analysis on samples from customer infrastructures
- Conducted code analysis for customer projects
Junior Penetration Tester | TS-Way S.r.l. | Orvieto, Italy
November 2013 – August 2014
- Performed penetration testing following OWASP guidelines
- Managed vulnerability assessment appliances on customer infrastructures
Skills
Languages: C, Assembly, Python, Rust, JavaScript, SQL, NoSQL
Technologies: Git, Docker, Linux
Specializations: Reverse Engineering, Malware Analysis
Certifications
- Cyber Threat Intelligence Analyst (CTIA) | EC-Council | June 2024
- Incident Responder | Group-IB | November 2021
Languages
- Italian/Arbereshe: Native
- English: Professional proficiency (C1 reading/writing, B2 speaking)
Notable Projects
Linux Kernel Patch: efistub/x86 SMBIOS Fallback | October 2025 – November 2025
Fixed EFI subsystem bug in Apple firmware by adding fallback method for SMBIOS information retrieval. Accepted by Linux kernel maintainers for version 6.19 release.
Radar - Asynchronous Network Scanner | May 2025 – Present
Rust-based network scanner with userspace implementation of TCP, UDP, ARP, and DHCP protocols using Linux raw sockets for active scanning and passive monitoring.
Lor - Light Onion Router | October 2015 – January 2017
Tor protocol client re-implementation using mbedTLS, demonstrating direct hidden service connection without Tor binary.
Ape Escape Manipulation Toolkit | April 2025 – June 2025
Rust toolset for game archive manipulation.
libfjson | May 2017
Recursive finite-state machine JSON parser in C, operating byte-by-byte with sub-6KB compiled size.