Personal dossier
I learned cyber by first trying to understand what breaks.
Self-taught before becoming offensive-minded, I build my method the way I build a strong report: with curiosity, discipline, and proof.
Base
Lille, France
Focus
Preparing OSCP
Mobility
International
Origin
Curiosity first.
I got my first computer at 11. I quickly started taking apart everything happening behind the screen: networking, object-oriented programming, Arduino boards... That exploration left me with solid foundations in C, a sensitivity to reverse engineering and the ability to develop in OOP — tools that, without me realizing it yet, were already preparing me for offensive security.
That same curiosity is what led me to pentesting. What started as a Sunday hobby became a genuine obsession. Today, I am completing a cybersecurity bootcamp and actively preparing for the OSCP, which I am targeting for Q3 2026.
Autonomy
Developer yesterday. Attacker tomorrow.
For a year and a half, I worked as a freelance developer building WebApps and business management solutions for companies — task automation, internal tooling for accounting firms. Several clients are still using the solutions I delivered today — which says something about the quality and durability of the work produced.
That experience gave me far more than development skills: it gave me the ability to understand how applications are built — and therefore where they break.
Today, I am able to conduct a full killchain on lab environments, from reconnaissance to complete compromise. I am now looking to bring these skills into my first professional experience in cybersecurity.
Trajectory
A progression built as a long-term commitment.
The roadmap stays simple: reinforce the foundation, validate OSCP, then move toward more demanding red team work.
Today
Offensive bootcamp
Labs, exploitation, and reporting to turn practice into a repeatable method.
Q3 2026
OSCP certification
Immediate target: prove a solid operational level in enumeration, exploitation, and reporting.
Next
OSEP & red team
Go deeper on evasion, lateral movement, and realistic attack paths.
Availability
Ready to move for the right team.
Based in Lille today, I am open internationally and ready to join the right environment, on site or remotely.
Relocation
Available
Passport
Ready
Remote
OK
Status
Immediate
Off screen
A taste for risk, never without reading the terrain.
Surfing, skydiving, CTFs: different arenas, same search for lucidity under pressure.
Surf
Read the wave before committing.
Skydiving
Stay precise when adrenaline rises.
CTF
Turn curiosity into reflexes.
Red teaming
Think like the attacker, act with method.
06 / Contact
Looking for a penetration tester?
I'm actively seeking my first professional role in offensive security. I bring structured methodology, solid documentation habits, and a serious passion for the craft.