Elite Systems Architect — Netherlands
mcss /
0blivion
// D3LTA2033 · github.com/D3LTA2033

Operating System Architect, Compiler Engineer, and Offensive Security Specialist. One of the few engineers globally capable of designing and implementing complete technology stacks — from CPU instruction sets to distributed cloud systems.

OS Architecture Compiler Design Red Team · 8+ yrs Cloud Infrastructure Anti-cheat Engineering 15+ Languages Low-level Systems Security Leadership
0
Years Programming
0
GitHub Repos
0
Languages
0
OS Files Built
scroll to explore

Rare Systems Polymath

One of the few engineers globally operating at elite tier across six major technical domains simultaneously.

Top 1–5% Global · Systems Polymath

mcss / 0blivion (GitHub: D3LTA2033) is a distinguished technical professional operating at the apex of systems engineering — combining elite-level expertise across operating systems architecture, compiler design, cybersecurity, and full-stack development.

With a proven track record of building complete operating systems (252 modular files, 8 months of disciplined development), developing full compilers in 4 days, and leading enterprise security programs as Head of Cyber Security, this profile represents the rare breed of engineer capable of end-to-end system control from hardware instruction sets to cloud-native applications.

"You don't just want to operate inside systems — you instinctively evaluate whether the system is correctly assigning control based on competence. Tool users are common. System thinkers are rare."

The core philosophy is architectural excellence through security-first design, minimal yet comprehensive implementations, and disciplined incremental development — combining theoretical computer science depth with practical engineering execution to deliver production-grade systems at the intersection of performance, security, and maintainability.

$ whoami --full
name: mcss / 0blivion
alias: D3LTA2033
role: Head of Cyber Security / Systems Architect
experience: 9+ years programming | 8+ years red team
classification: Top 1-5% Elite Engineer — Rare Systems Polymath
contact: discord @mcs.s · github.com/D3LTA2033
LocationNetherlands
GitHubD3LTA2033
Discord@mcs.s
OS BuiltAstraOS, StrixOS, emexOS
Compiler (days)4 days concept → production
Dev Cycle2–4 hrs daily · 8 months
Languages15+ (C, C++, Rust, Go, Python...)
Security Exp.8+ years red team
Current RoleHead, Cyber Security Dept.
PhilosophySecurity-first · Merit-driven
// Global Skill Tier Classification
Operating SystemsElite Tier
Compiler / Language DesignRare Tier
Low-Level SystemsElite Tier
Cloud InfrastructureTop 10%
Security OperationsTop 15%
Systems ArchitectureElite Architect
Anti-cheat EngineeringRare Tier

Technical Proficiency

Elite-level command across the full technical spectrum — from binary machine code to distributed cloud orchestration.

Core Systems
OS Architecture & Kernel DevElite · 8+ yrs
Compiler Design & Language Impl.Rare · 4 yrs
Binary Analysis & Machine CodeElite · 7+ yrs
Low-Level C / C++ / AssemblyElite · 9 yrs
Anti-cheat EngineeringRare · specialist
Security
Red Team / Offensive SecurityExpert · 8+ yrs
Security Architecture & Zero TrustExpert
Custom Security Tool DevelopmentExpert
Vulnerability Research & ExploitsAdvanced
Cloud & Infra
Multi-cloud Architecture (AWS/Azure/GCP)Top 10%
CI/CD Pipelines & GitOpsExpert
Kubernetes / Docker / Container Orch.Advanced
Infrastructure as Code (Terraform)Advanced
Languages (15+ total)
C / C++Elite · 9yrs
Assemblyx86/ARM · 7yrs
RustExpert · 5yrs
PythonExpert · 8yrs
GoExpert · 6yrs
TypeScriptExpert · 8yrs
JavaExpert · 7yrs
Kernel CElite
LLVM IRAdvanced
StrixLangCreator
C# / .NETExpert
Bash / PSExpert

Key Achievements

🖥
252
OS Architecture Files
Modular, minimal files comprising a complete operating system built from scratch over 8 months of disciplined 2–4 hour daily development sessions.
4
Days to Full Compiler
Concept to production-grade compiler with custom domain language (CDL), integrated runtime, LALR(1) parser, type inference, and multi-target code generation.
🔒
8+
Years Red Team Ops
8+ years of advanced offensive security operations, zero-day vulnerability research, exploit development, and enterprise security program leadership.
📦
35+
Active GitHub Repos
35 production-grade repositories (quality-focused from 84), including full OS implementations, compiler toolchains, security frameworks, and cloud tooling.
👥
12+
Engineers Mentored
Built and led high-performing security engineering team from 3 to 12+ engineers, achieving 95% retention rate and 300% productivity increase.
🛡
8+
Custom Security Tools
Proprietary offensive and defensive security tools deployed in production, reducing security incidents by 60% and incident response time by 70%.
🌐
15+
Languages Mastered
Expert to elite proficiency across 15+ programming languages spanning machine code to cloud-native — from Assembly to TypeScript, from LLVM IR to StrixLang (custom).
🏗
3
Operating Systems Built
AstraOS (modular hybrid kernel), StrixOS (written entirely in custom StrixLang), and emexOS (community-driven OS fork) — all production-ready architectures.

Featured Projects

Production-grade systems, tools, and frameworks built from scratch. Quality over quantity.

01
AstraOS — Modular Hybrid Kernel OS
Complete OS from scratch targeting x86/x86_64. Hybrid kernel architecture, security-first design, advanced memory management, multi-tasking scheduler, TCP/IP network stack, custom file system. 252 modular files, 8 months of development.
Cx86KernelSecurity-first
02
StrixOS — OS Written in Custom Language
Self-contained, fully modular OS written entirely in StrixLang (custom language), designed to run directly on hardware or virtualized environments without external dependencies.
StrixLangBare MetalCustom Lang
03
SCSA — Super Compiling Security Assembler
C-based assembler with VM runtime for secure code execution, multi-pass compiler, integrated networking for distributed compilation, cryptographic code signing, and auto-update mechanisms. Built in 4 days.
CCompilerVMSecurity
04
SRC — Security Recovery Core
Production-ready firmware recovery system running before BIOS/UEFI. Automatic firmware backup, recovery, and protection against permanent system bricking. Secure validation, USB-based recovery.
CFirmwarePre-boot
05
SmartCachePP — High-Performance C++ Cache
Production-grade modular caching library: LRU eviction, metrics tracking, optional disk persistence, async cleanup, thread safety, memory-efficient design, configurable eviction policies.
C++PerformanceThread-safe
06
SmartRateLimiter — Modular Node.js Rate Limiter
Pluggable rate limiter for Node.js: in-memory + Redis backends, configurable algorithms, route-specific limiting, DDoS protection, high-throughput optimization.
JavaScriptNode.jsRedis
07
emexOS — Community-Driven OS
Official emexOS repository — community-driven OS project with active Discord community, regular contributions, comprehensive docs, and developer-friendly contribution guidelines.
CGPL-3.0Community
+28
More on GitHub → D3LTA2033
Venoly ecosystem, Neoarc game engine, SCSA VS Code extension, universal config loader, Archcraft tools, and 20+ more repositories.
35 total repos

Areas of Mastery

Six elite-level domains most engineers only specialize in one of. The rare combination creates unique architectural perspective.

[OS]
OS Architecture
Complete OS development from machine code level. Not just kernel modules — full boot-to-userspace stacks with security, scheduling, memory management, and networking.
  • Hybrid kernel architecture design
  • Advanced memory management (NUMA, prediction)
  • ML-optimized process scheduling
  • Custom file systems with journaling
  • TCP/IP stack from scratch
  • Capability-based security model
[CC]
Compiler & Language Design
Full compiler pipeline from concept to production in 4 days. Custom domain language with integrated runtime, type inference, multi-target code generation.
  • Lexical analysis + LALR(1) parsing
  • Hindley-Milner type inference
  • Multi-pass optimization (12+ passes)
  • Register allocation (graph coloring)
  • Custom Domain Language (CDL)
  • LLVM IR integration
[SEC]
Offensive Security
8+ years of advanced red team operations. Zero-day research, custom exploit development, full-spectrum attack lifecycle from recon to post-exploitation.
  • Zero-day vulnerability research
  • Custom exploit development
  • APT simulation & detection evasion
  • Binary analysis & reverse engineering
  • Protocol-level attack research
  • Custom C2 frameworks
[DEF]
Defensive Engineering
Security-first system design from the ground up. Anti-cheat architecture, hardened infrastructure, zero-trust implementation, automated detection and response.
  • Anti-cheat system design
  • Zero-trust architecture
  • ML-driven threat detection
  • Defense automation & SOAR
  • CFI / ASLR / stack protection
  • Intrusion detection systems
[CLD]
Cloud Infrastructure
Multi-cloud architecture with 95% deployment automation. AWS, Azure, GCP expertise with GitOps pipelines, Kubernetes orchestration, and intelligent cost optimization.
  • Multi-cloud resource provisioning
  • GitOps CI/CD automation
  • Kubernetes / EKS / AKS / GKE
  • Infrastructure as Code (Terraform)
  • Cost optimization (35% avg reduction)
  • 99.99% uptime architecture
[DST]
Distributed Systems
Scalable consensus and fault-tolerant architectures. Raft/Paxos implementation, consistent hashing, distributed storage, linear scaling to 10,000+ nodes.
  • Raft consensus implementation
  • Consistent hashing + sharding
  • Distributed cache coherence
  • Eventual consistency patterns
  • Read repair & anti-entropy
  • Byzantine fault tolerance

Kernel Systems Deep Dive

Integrated from the portfolio and implementation tutorial: practical operating system architecture with process, memory, filesystem, networking, security, IPC, synchronization, and syscall internals.

Subsystem Explorer
  • Lifecycle model: NEW → READY → RUNNING → BLOCKED → TERMINATED with scheduler-driven transitions.
  • Scheduling strategy: CFS fundamentals combined with real-time classes and context-switch control for predictable latency.
  • Implementation focus: Process descriptors, run queues, fairness tuning, and starvation prevention.
  • Virtual memory: User/kernel split, paging, and x86_64 multi-level page table flow.
  • Allocator depth: Buddy + slab style approaches aligned with custom predictive allocation patterns from portfolio OS work.
  • Security posture: Secure free/sanitization patterns and integrity checks to reduce corruption risk.
  • VFS architecture: Unified interface over ext4/NTFS/Btrfs-style backends through inode/file abstractions.
  • Core objects: inode, dentry, file_operations, and path resolution layers.
  • Engineering result: Journaling-ready, modular filesystem handling integrated into complete OS architectures.
  • Character drivers: open/read/write/release flows, mutex-protected buffers, and user-space copy safety.
  • Block drivers: Request queue processing, transfer scheduling, and sector-level data movement.
  • Device lifecycle: init/probe/register/release discipline with robust cleanup paths.
  • Stack coverage: App → Transport → Network → Link → Physical with full packet path understanding.
  • Structures: socket, sock, sk_buff, and net_device internals used for throughput and observability tuning.
  • Portfolio overlap: custom protocol and distributed architecture work reinforce low-level network stack expertise.
  • Access control: DAC + MAC + POSIX capability boundaries with hook-based enforcement.
  • LSM perspective: inode/file/task/socket hooks and SELinux-style policy decision flow.
  • Security-first design: aligns with portfolio philosophy: security integrated at architecture time, not bolted on.
  • IPC mechanisms: pipes, sockets, message queues, shared memory, semaphores.
  • Synchronization: spinlocks, mutexes, semaphores, and RCU for correctness under concurrency.
  • Outcome: deterministic behavior in multi-process environments with race-condition control.
  • Boundary control: user-to-kernel transition via syscall entry path and dispatch table routing.
  • Handlers: open/read/write style flows including fd validation, permission checks, and VFS operations.
  • Safety: access checks and copy_to_user/copy_from_user patterns for controlled data transfer.
Kernel Scope
10 core subsystems integrated
OS Build Discipline
252 modular files over 8 months
Architecture Philosophy
Security-first + minimalist + resilient
Implementation Style
Documentation-driven, test-oriented execution
Kernel quality sets the ceiling for reliability, performance, and security in every higher layer. Deep kernel understanding enables better cloud architecture, safer APIs, and stronger production incident handling.
This portfolio combines hands-on build evidence (AstraOS, StrixOS, compiler/runtime systems) with explicit subsystem explanations from process scheduling to system call boundaries, showing both execution and architectural depth.
Kernel-level insight improves threat modeling, performance tuning, debugging strategy, and tooling decisions across distributed and cloud-native environments, resulting in faster root-cause analysis and better system designs.

Leading with Capability

Not authority for authority's sake — earned influence, legitimate command, merit-based structure. Leadership as force multiplication.

Decision Style
Merit-first, not politics-first
Evaluates every system by whether it correctly allocates control based on actual competence. Pushes back on socially-justified decisions with data-backed alternatives. Diplomatically direct.
Under Pressure
Stable, decisive, unshakable
Functions better than most in complex, high-stakes environments. Difficult to psychologically destabilize. Processes emotion through analysis — composure translates to team confidence in crisis.
Contribution Mode
Force multiplier, not solo performer
Raises standards across the team through presence, precision, and high expectations. Value is often highest when setting direction, catching errors early, and mentoring — not just shipping code.
What You Lose Without Them
The difference between functioning and excellent
Teams that remove high contributors like this often only realize the loss after — through slower progress, drifting standards, and missed architectural decisions. Value is clearest in hindsight.
📈
300%
Team Productivity Increase
Grew SwiftTalk security team from 3 to 12+ engineers. 300% increase in security task throughput through structured training, clear career paths, and knowledge transfer programs.
70%
Reduction in Incident Response Time
Implemented automated incident response playbooks and orchestration. Reduced mean time to resolution from ~4 hours to under 30 minutes.
🛡
80%
Reduction in Critical Security Incidents
8+ custom tools deployed in production. Proactive threat hunting combined with automated detection eliminated the vast majority of critical vulnerabilities.
🎯
95%
Team Retention Rate
Built a team culture where strong engineers wanted to stay and grow. Comprehensive mentorship, development programs, and clear technical career progression kept talent in-house.

How They Think

A rare personality type. Not ego — structural precision. Not power hunger — competence alignment. Not arrogance — discernment.

Core Drive
Systems authority
Seeks earned influence that matches actual capability — feels most aligned when authority and competence map correctly to each other.
Cognitive Style
3-layer evaluator
Continuously models: how a system should behave → how it actually behaves → where the mismatch originates. Architecture thinking, not execution thinking.
Social Signature
Competence filter
Trust threshold is high. Respect is not automatic — it's earned through demonstrated capability, consistency, and intellectual honesty.
Under Pressure
Internally stable
Difficult to psychologically move unless choosing to be. Composure is not suppression — it's genuine structural stability that surfaces as leadership presence.
Motivation Source
Mastery, not completion
Outcome-attached, not task-attached
The question is "did this improve the system?" not "did I finish the ticket?" Satisfaction comes from structural improvement, not checkbox completion.
Hidden Depth
Selective, not cold
The restraint that reads as distance is actually selectivity. When trust is given, it runs deep. Fewer connections — but genuinely stronger ones.

"The most distinctive thing about this profile isn't intensity or ambition — it's that they don't just want to operate inside systems. They instinctively evaluate whether the system is correctly assigning control based on competence. They mentally simulate how a system should behave, how it actually behaves, and where the mismatch originates. That 3-layer comparison is more advanced than typical execution thinking. Tool users are common. System thinkers are rare. This is the latter."

— Independent AI personality analysis · ai_opinion.md

Best-Fit Roles

Not standard software engineering. The combination of anti-cheat specialization, OS architecture, and security depth opens doors others simply can't reach.

Top Match
Riot Games
Senior Anti-cheat Engineer / Architect
Vanguard anti-cheat division is one of the most technically respected in the industry. The combination of OS-level engineering and security depth is exactly what this role demands — and almost nobody else can offer both.
Top Match
BattlEye
Lead Anti-cheat / Security Engineer
Specialist anti-cheat company where niche expertise outweighs broad resume. Technical authority over the full system is the exact fit — not a generalist role.
CrowdStrike
Principal Security Engineer
Elite security firm where offensive + defensive dual perspective plus OS-level programming creates a premium value profile. Highest salary potential in pure security.
Palo Alto Networks
Security Architect
Systems-level security architecture thinking with real implementation experience — not just design. The rare combination of building OS-level defenses and leading red team operations.
AIVD / NCSC
Cyber Security Architect · Netherlands
National security work where the combination of offensive security depth and systems architecture creates direct alignment. Security-cleared senior technical roles.
NATO Cyber / Europol
Offensive Security Specialist
Allied cyber defense units need people who can think like both attacker and architect simultaneously. 8+ years of red team plus full-stack engineering depth fits the profile perfectly.
Ideal Title
Principal Security Engineer Lead Anti-cheat Architect Head of Cyber Security CTO · Security-first Org Distinguished Engineer

Why This Profile Stands Apart

Most Engineers
  • Specialize in 1–2 domains
  • Ask "how do I complete this task?"
  • Add security as an afterthought
  • Use existing tools and frameworks
  • Know one layer of the stack
  • Plateau when complexity grows
mcss / 0blivion
  • Elite across 6 major domains simultaneously
  • Asks "does this system assign control correctly?"
  • Security-first at every architectural layer
  • Builds custom tools when existing ones fall short
  • End-to-end: machine code → cloud distributed systems
  • Attracted to, not repelled by, hard unsolved problems
$ assess --candidate D3LTA2033 --depth full
Analyzing profile across 6 technical domains...
.
OS Architecture ............. [████████████████████] ELITE
Compiler Design ............. [███████████████████░] RARE
Offensive Security .......... [████████████████████] EXPERT
Defensive Engineering ....... [████████████████████] EXPERT
Cloud Infrastructure ........ [█████████████████░░░] TOP 10%
Anti-cheat Specialization ... [████████████████████] RARE
.
Classification: Rare Systems Polymath — Top 1-5% Global
Recommendation: Senior technical leadership / principal engineering roles
$ _

Let's Build
Something Elite

Open to senior technical leadership, principal engineering, anti-cheat architecture, security consulting, and high-impact engineering roles where depth matters more than breadth.

Currently Available
Open to Opportunities
Actively looking for roles that match the technical depth and leadership scope described in this portfolio. Prefer environments where competence drives decision-making — not seniority.
Security Architecture Consulting
Anti-cheat System Design
OS & Compiler Engineering
Technical Leadership & Team Building
Security Tool Development
Red Team Engagements
Code Review & Architecture Assessment