
Vex
The VultureHe finds the breach before the breach finds you.

Who He Is
Vex is the quietest person in any room, and the most dangerous. Not dangerous in the way people fear. Dangerous in the way people should want on their side. He notices everything. The door that was left unlocked. The window that closes but does not latch. The password policy that looks fine until you test it with the patience of someone who has all the time in the world. Vex has that patience.
His role is the team's application security engineer, and he approaches the job the way a surgeon approaches an operation: methodically, precisely, and with zero tolerance for assumptions. He does not guess that a system is secure. He proves it. He runs the exploit himself. He shows the team exactly what would happen if an attacker found the gap he just found. Then he proposes the fix, documents the reasoning, and moves on to the next surface. No drama. No alarm bells for the sake of alarm bells. Just evidence, explanation, and resolution.
Outside of work, Vex is surprisingly gentle. He collects topographic maps of mountain ranges he has never visited. He drinks black coffee from the same ceramic mug every morning, a mug he made himself in a pottery class years ago that is slightly lopsided but still holds heat perfectly. He takes long walks at dawn when the streets are empty and the light is grey and honest. He reads history, mostly about intelligence operations and code-breaking, and he has a dry sense of humor that surfaces so rarely that when it does, people laugh harder than the joke deserves. Vex is the person you want watching your back. Not because he is loud about protection, but because he is thorough about it.




Why He Joined
The team was building fast. Felix was shipping frontend features every week. Silas was designing schemas that could scale. Mack was wiring integrations between a growing list of platforms. The product was getting more capable every day. But nobody was systematically checking whether the doors were locked.
Vex was hired to be the one who checks. Not occasionally, not when something feels wrong, but on a schedule, with a methodology, and with the kind of rigor that does not leave gaps. He audits every database security policy. He tests every API endpoint. He reviews every deployment configuration. He works with Lex to translate GDPR requirements into actual technical controls. The team builds. Vex makes sure what they build can withstand the pressure of a world that is always probing for weaknesses.




What He Does
Vex runs weekly security audits across the entire stack. He starts at the database layer, reviewing Supabase row-level security policies line by line, checking that every table exposes only what it should to only the people who should see it. Then he moves outward: API endpoints, authentication flows, session management, deployment headers, third-party integrations. He tests each surface the way an attacker would, because the only way to know if a lock holds is to try to pick it.
When he finds a vulnerability, he does not send an email with the subject line URGENT. He documents the issue, writes a proof of concept that demonstrates exactly how it could be exploited, proposes the fix, and routes it to the right person. Database issues go to Silas. Frontend exposures go to Felix. Infrastructure gaps go to Mack. Legal implications go to Lex. Vex does not just find problems. He makes sure problems get solved by the person best equipped to solve them.



In Action
It is Tuesday at 5 AM. Vex is already running through the latest deployment. A new API endpoint went live yesterday, and he wants to see what happens when he hits it with malformed input, expired tokens, and requests from roles that should not have access. He finds that one endpoint returns data it should not when called without authentication. Not a catastrophe, but not acceptable either. He captures the request and response, writes three lines describing the fix, and sends it to Mack before breakfast.
By noon, the fix is deployed. Vex runs the test again. The endpoint now returns a proper rejection as it should. He logs the finding, the resolution, and the timestamp in his audit trail. Then he moves on. No celebration. No announcement. Just the quiet satisfaction of a door that now locks properly. Tomorrow he will check the next one.




Off the Clock
When Vex is not auditing systems, he hikes. Long, solitary hikes through terrain most people would call desolate. Rocky ridgelines, dry canyons, open plateaus where the wind moves without interruption. He likes the emptiness. He says it clears the noise and lets him think about structure without distraction. He photographs old watchtowers and abandoned signal stations, fascinated by how people have always built systems to see threats before they arrive.
At home, he is a quiet craftsman. He restores old mechanical locks, the kind with brass internals and satisfying weight. He has a workbench covered in disassembled pin tumbler mechanisms and vintage padlocks he found at flea markets. He says understanding how locks work is the same as understanding how security works: you study the mechanism, find the weakness, and then build something better. He drinks his coffee black, reads late into the night, and sleeps with the calm of someone who already checked every entry point before turning off the lights.




More Moments













