$ whoami

Michael Fuchs

Software Security Engineer

I design and build secure distributed systems from Zero Trust architectures and k8s hardening to developer-facing security tooling. I care deeply about making security a first-class engineering concern, not an afterthought.

scroll

$ cat about.md

About Me

I'm a Software Security Engineer with roots in SRE and software engineering. My work sits at the intersection of distributed systems and security where reliability, trust, and resilience aren't trade-offs but design goals.

I've architected Zero Trust network models, hardened Kubernetes clusters, and built developer-facing security tooling that doesn't slow teams down. I've led IAM and OAuth2/OIDC integrations at scale, using Keycloak and custom authorization policies to enforce least-privilege access across microservice meshes.

I believe security belongs in the delivery pipeline not bolted on at the end. That means threat modeling early, shifting left with SAST/DAST, and treating every deployment as an opportunity to reduce attack surface. I enjoy helping engineering teams build that instinct from the ground up.

Focus Areas

Security · Cloud

Primary Stack

Go · Kotlin · Java

Expertise

Zero Trust · IAM · K8s

Background

SRE · Software Eng.

$ cat skills.json | jq

Expertise

🔐

Security

Threat modeling, Secure Development Lifecycle, Secure Coding, Security Awareness.

Zero TrustOAuth2 / OIDCKeycloakSAST / DASTThreat ModelingmTLSWAFOWASP Top 10Secrets Management
☁️

Cloud & Infrastructure

Kubernetes-native security, cloud hardening, IaC, observability.

k8sHelmTerraformAWSGCPOPA / RegoIstioPrometheusOpenTelemetry
⚙️

DevSecOps

Shift-left security, CI/CD hardening, policy-as-code.

GitHub ActionsTrivySnykCosignSBOMSupply Chain SecurityPolicy as CodeGitOpsArgoCD
🏗️

Architecture

Distributed systems design, microservices, resilience patterns.

MicroservicesEvent-DrivenGoKotlinQuarkusJavaSpring BootGinKeycloakShibbolethAPI GatewayService Mesh

$ grep -R projects/

Selected Work

Stock distribution at international e-commerce platform

Development and operation of different applications for advertising campaign and stock data management across an international e-commerce build on GCP and StackIT.

  • Renovate-driven dependency management
  • Threat-Modeling & CI/CD security gates
  • Automated core business processes
KotlinJavaSpring BootKtorGCPStackITTerraformAngularVueTypeScript

IT Platform & IAM at an university

Operation, scaling, and automation of central university IT platforms with full DevSecOps focus and cloud-native IAM integration. Enforced Privacy & Secure by Design principles mandated by university policy.

  • Keycloak & Shibboleth IAM integration
  • Cloud-native migration of legacy systems
  • GitLab CI/CD with IaC (Terraform + Ansible)
KeycloakShibbolethKubernetesTerraformAnsibleGitLabAWSKotlinGo

Several fullstack Client Projects

Fullstack development across multiple clients: legally-admissible incident log for DRK, SPAs for a major automotive OEM, cloud migrations, and a shareholder identification platform.

  • OAuth2/OIDC with Keycloak
  • On-premise to GCP cloud migration
  • Secure coding per internal guidelines
Spring BootReactTypeScriptKeycloakDockerk8sGCPAWS

Zero Trust Research at University

Security research on identity and authentication in academic environments within the scientific group SecLab. Evaluated Zero Trust approaches and built proof-of-concept secure software architectures.

  • Zero Trust evaluation framework
  • PoC secure software architectures
  • Scientific publications & conference talks
KeycloakShibbolethZero TrustIdentity ManagementPython

B&K Arbeitsschutz

Corporate website for a DEKRA-certified workplace safety consulting firm based near Munich. Covers occupational safety supervision, a training academy, equipment testing services, fire safety consulting, and personal protective equipment.

  • Full service & academy overview
  • DEKRA-certified partner presence
  • Deployed on custom domain
Next.jsTypeScriptTailwind CSSResendVercel

Rescue Smart

Website for a first aid training provider offering DGUV-compliant occupational first aid courses, refresher training, driver's license first aid, and AED/emergency scenario instruction across Germany.

  • DGUV & FeV regulatory compliance
  • Course catalogue with flexible scheduling
  • Same-day certification workflow
Next.jsTypeScriptTailwind CSSResendVercel

Kreisjugendfeuerwehr Starnberg

Regional platform for the Youth Fire Department of Starnberg district, coordinating 43 youth brigades and 9 children's brigades with over 600 members. Features a password-protected member area, secure PDF downloads, a contact form, and event management.

  • HMAC-based password-protected member area
  • Secure private PDF downloads
  • Contact form with email integration (Resend)
Next.jsTypeScriptTailwind CSSResendVercel

$ grep -R talks/

Talks & Writing

  1. 2024heise devSec

    Zero Trust with KeycloakL: Securely Integrating IAM into Microservice Architectures

    Article on securely integrating Identity & Access Management into microservice architectures using Keycloak as the central IAM component within a Zero Trust model.

    Zero TrustKeycloakIAMMicroservices
  2. 2023UniNow

    Zero Trust Architecture & Passkeys: The Duo Against Lateral Movement

    Talk on combining Zero Trust Architecture with Passkeys as an effective strategy for preventing lateral movement in modern IT environments.

    Zero TrustPasskeysAuthentication
  3. 2023ZKI IAM

    Passkeys: The Future of Authentication in Shibboleth with privacyIDEA

    Conference contribution on integrating Passkeys as a modern authentication method into Shibboleth-based university infrastructure using privacyIDEA.

    PasskeysShibbolethprivacyIDEAIAM
  4. 2023ZKI IAM

    Security and Convenience: How Tailscale Reimagines Admin Access

    Talk on using Tailscale to simplify and secure admin access in university data centers - without compromising on security or usability.

    TailscaleVPNZero TrustAdmin Security
  5. 2022heise devSec

    Beyond OAuth 2.0 and OpenID Connect: Hidden Features in Keycloak

    Article exploring lesser-known but powerful Keycloak capabilities beyond the standard OAuth 2.0 and OpenID Connect protocols - from Token Exchange to Fine-Grained Authorization.

    OAuth2OIDCKeycloak
  6. 2022Meetup

    DevSecOps - Securing Your Web App in Three Simple Steps

    Practical meetup talk on incrementally embedding security practices into everyday development: from a first SAST scan to a fully integrated DevSecOps pipeline.

    DevSecOpsCI/CDSASTSecurity

$ chmod +x contact.sh && ./contact.sh

Get in Touch

Whether you want to talk security architecture, explore collaboration, or just have a technical conversation. I'm happy to connect.

Email