Personal dossier
I learned cyber by first trying to understand what breaks.
Self-taught before becoming offensive-minded, I build my method the way I build a strong report: with curiosity, discipline, and proof.
Base
Lille, France
Focus
Preparing OSCP
Mobility
International
Origin
Curiosity first.
I got my first computer at 11. I quickly started taking apart everything happening behind the screen: networking, object-oriented programming, Arduino boards... That exploration left me with solid foundations in C, a sensitivity to reverse engineering and the ability to develop in OOP — tools that, without me realizing it yet, were already preparing me for offensive security.
That same curiosity is what led me to pentesting. What started as a Sunday hobby became a genuine obsession. Today, I am completing a cybersecurity bootcamp and actively preparing for the OSCP, which I am targeting for Q3 2026.
Autonomy
Developer yesterday. Attacker tomorrow.
For a year and a half, I worked as a freelance developer building WebApps and business management solutions for companies — task automation, internal tooling for accounting firms. Several clients are still using the solutions I delivered today — which says something about the quality and durability of the work produced.
That experience gave me far more than development skills: it gave me the ability to understand how applications are built — and therefore where they break.
Today, I am able to conduct a full killchain on lab environments, from reconnaissance to complete compromise. I am now looking to bring these skills into my first professional experience in cybersecurity.
Trajectory
A progression built as a long-term commitment.
The roadmap stays simple: reinforce the foundation, validate OSCP, then move toward more demanding red team work.
Today
Offensive bootcamp
Labs, exploitation, and reporting to turn practice into a repeatable method.
Q3 2026
OSCP certification
Immediate target: prove a solid operational level in enumeration, exploitation, and reporting.
Next
OSEP & red team
Go deeper on evasion, lateral movement, and realistic attack paths.
Availability
Ready to move for the right team.
Based in Lille today, I am open internationally and ready to join the right environment, on site or remotely.
Relocation
Available
Passport
Ready
Remote
OK
Status
Immediate
06 / Contact
Looking for a penetration tester?
I'm actively seeking my first professional role in offensive security. I bring structured methodology, solid documentation habits, and a serious passion for the craft.