Skip to main content

Who's Merox?

·3 mins· loading · ·
Merox
Author
Robert Melcher
„Sutor, ne ultra crepidam”
Table of Contents

Seasoned System Administrator and Cybersecurity Engineer, with a profound passion for Linux, Networking, and Security. My career has been a journey through challenging roles, where I've developed a blend of technical prowess and strategic insight.

Why merox.dev?
#

Well, “merox.dev” does have a personal touch and a little history. It’s a fusion of elements that reflect both my background and interests:

  • MERO: The first part of the name comes from combining the first letters of my name, “ME” for Melcher and “RO” for Robert. This is sort of a wink toward my identity and a touch of personality within the work I do.

  • The “X” in “merox” adds some mystery and adaptability to the name. My username was originally based on hexadecimal notation—“mer0x39,” where “0x39” is the number 57, essentially the day and month of my birthday.

The idea of merox.dev was to create a full-scale repository including all my experience and knowledge gained within the last ten years working in IT. This site is my personal archive, containing from complex technical solutions to many experiences obtained during projects. A blog section is the newest part where I share my thoughts, trends, and updates on what’s new in tech.

In essence, merox.dev represents a bit of my path, expertise, and passion for IT; it provides useful resources and information to others within this industry.

Professional Journey
#

Throughout my career, I’ve had the privilege of working with industry leaders such as Hella, Atos, and Netex. These experiences have shaped my approach to IT and cybersecurity, allowing me to:

  • Spearhead cutting-edge cybersecurity initiatives
  • Optimize complex server environments
  • Align IT strategies with organizational goals

Key Achievements
#

  • 🐳 Successfully dockerized and migrated a Puppet server from a virtual machine to a Kubernetes cluster, enhancing scalability and resource efficiency
  • 🖥️ Led the migration and creation of Forescout policies from Windows 7 to Windows 10, ensuring seamless transition and improved security posture
  • 🛡️ Implemented robust security measures across various network devices including Palo Alto, Fortigate, Cisco, and McAfee, significantly enhancing the organization’s cybersecurity infrastructure
  • 💾 Designed and implemented a comprehensive backup solution using Bareos for an entire datacenter, ensuring data integrity and disaster recovery readiness
  • 🌐 Leveraged CCNA expertise to design and implement complex network infrastructures, optimizing performance and security
  • 🚀 Orchestrated multiple infrastructure modernization projects, improving system reliability and operational efficiency

Core Competencies
#

Linux SystemsNetworkingSecurity
System optimizationInfrastructure designThreat analysis
Shell scriptingNetwork protocolsPenetration testing
Performance tuningTroubleshootingSecurity audits

Philosophy & Continuous Learning
#

I believe in the power of continuous learning and staying ahead of the technological curve. My approach involves:

  1. Constantly exploring emerging technologies
  2. Participating in cybersecurity communities and forums
  3. Sharing knowledge through mentoring and tech talks

Let’s Connect
#

Interested in collaborating or learning more about my work? I’m always open to discussing new opportunities and ideas in the world of IT and cybersecurity.

Related

Tailscale site-to-site pfSense - Linux
·4 mins· loading
Networking Installation Tutorial Network
I’ve decided to implement monitoring for my homelab through a cloud virtual machine. As cloud provider I’ve opted for Hetzner…
Deploying a Kubernetes-Based Media Server
·9 mins· loading
Kubernetes Installation Tutorial Opensource
For a long time, I’ve been on the hunt for a comprehensive and well-crafted tutorial to deploy a media server on my Kubernetes cluster.