Personal dossier

I learned cyber by first trying to understand what breaks.

Self-taught before becoming offensive-minded, I build my method the way I build a strong report: with curiosity, discipline, and proof.

Base

Lille, France

Focus

Preparing OSCP

Mobility

International

Origin

Curiosity first.

I got my first computer at 11. I quickly started taking apart everything happening behind the screen: networking, object-oriented programming, Arduino boards... That exploration left me with solid foundations in C, a sensitivity to reverse engineering and the ability to develop in OOP — tools that, without me realizing it yet, were already preparing me for offensive security.

That same curiosity is what led me to pentesting. What started as a Sunday hobby became a genuine obsession. Today, I am completing a cybersecurity bootcamp and actively preparing for the OSCP, which I am targeting for Q3 2026.

Autonomy

Developer yesterday. Attacker tomorrow.

For a year and a half, I worked as a freelance developer building WebApps and business management solutions for companies — task automation, internal tooling for accounting firms. Several clients are still using the solutions I delivered today — which says something about the quality and durability of the work produced.

That experience gave me far more than development skills: it gave me the ability to understand how applications are built — and therefore where they break.

Today, I am able to conduct a full killchain on lab environments, from reconnaissance to complete compromise. I am now looking to bring these skills into my first professional experience in cybersecurity.

Trajectory

A progression built as a long-term commitment.

The roadmap stays simple: reinforce the foundation, validate OSCP, then move toward more demanding red team work.

Today

Offensive bootcamp

Labs, exploitation, and reporting to turn practice into a repeatable method.

Q3 2026

OSCP certification

Immediate target: prove a solid operational level in enumeration, exploitation, and reporting.

Next

OSEP & red team

Go deeper on evasion, lateral movement, and realistic attack paths.

Availability

Ready to move for the right team.

Based in Lille today, I am open internationally and ready to join the right environment, on site or remotely.

Relocation

Available

Passport

Ready

Remote

OK

Status

Immediate

Off screen

A taste for risk, never without reading the terrain.

Surfing, skydiving, CTFs: different arenas, same search for lucidity under pressure.

Surf

Read the wave before committing.

Skydiving

Stay precise when adrenaline rises.

CTF

Turn curiosity into reflexes.

Red teaming

Think like the attacker, act with method.

06 / Contact

Looking for a penetration tester?

I'm actively seeking my first professional role in offensive security. I bring structured methodology, solid documentation habits, and a serious passion for the craft.