Marco Colletti

Software Engineer

Full Stack Software Engineer with a deep passion for cybersecurity and building enterprise solutions that matter. My journey started with competitive hacking and evolved into architecting mission-critical platforms that power complex digital investigations and intelligence operations.

[email protected]LinkedInSaronno (VA), Italy
Marco Colletti profile photo

About Me

At iPS, I build microservices architectures that power digital investigations worldwide. I've designed production-ready AI infrastructure integrating NLP and audio processing models, developed orchestration platforms for spoofed Android emulators, and contributed to enterprise OSINT tools used by international law enforcement. My reverse engineering work includes advanced device spoofing and SSL unpinning for security analysis.

As an instructor for CyberChallenge.IT at University of Insubria, I've trained over 100 students through intensive programs, delivering specialized training in web exploitation and creating hands-on labs covering SQL injection, XSS, CSRF, and authentication bypass. I discovered a critical vulnerability (CVSS 9.8) in a widely-used application, demonstrating a security-first engineering mindset with both offensive and defensive expertise.

My stack includes Golang, React, TypeScript, Python, Docker, Kubernetes, MongoDB, and a full security toolkit (Frida, Burp Suite, Wireshark, IDA Pro, Ghidra). Next step? Specializing at the intersection of AI/ML and Cloud Infrastructure at scale, evolving toward technical leadership roles where security, performance, and innovation are non-negotiable.

Experience

iPS Intelligence S.p.A.

Software Engineer

  • Full Stack Developer on microservices architectures for mission-critical enterprise applications serving governments and law enforcement agencies
  • Designed production-ready AI infrastructure integrating NLP and audio processing capabilities
  • Developed Android emulator orchestration platform with device spoofing (Golang, React, MongoDB)
  • Contributed to enterprise OSINT tools for international law enforcement
  • Performed Android reverse engineering with device spoofing and SSL unpinning techniques
  • Developed and maintained microservices-based systems with secure coding practices and scalable architectures

University of Insubria

Cyber Security Instructor

  • Local coordinator and instructor for the advanced CyberChallenge.IT program
  • Coordinated annual programs (72 hours, ~25 students per edition)
  • Trained over 100 students total (6 university credits awarded)
  • Delivered 24 hours of Web Exploitation instruction
  • Designed 150+ slides and 10+ hands-on laboratories
  • Selected as national instructor after ranking 3rd individually and 2nd in team competitions at CyberChallenge.IT

Education

University of Milan

B.Sc. in Security of Information Systems and Networks

In progress

ITIS G. Riva

High School Diploma in Computer Science and Telecommunications

Competitions & Achievements

CyberChallenge.IT

2022 Local Competition3rd

of 19 participants

2022 National Competition2nd

of 34 participants

Olicyber.IT

202128th

of 300 participants

20228th

of 96 participants

202333rd

of 87 participants

Focus Areas

Reverse Engineering

Frida, IDA Pro, Ghidra, runtime instrumentation, dynamic analysis

Android Security

Application analysis, device spoofing, SSL unpinning, vulnerability research

Web Exploitation

SQLi, XSS, SSRF, CSRF, SSTI, Burp Suite, OWASP ZAP

Full Stack Development

Golang, React, TypeScript, Python, MongoDB, NATS, microservices

Languages

Italian

Native

English

Proficient

Badges & Certifications