Personal dossier

I learned cyber by first trying to understand what breaks.

Self-taught before becoming offensive-minded, I build my method the way I build a strong report: with curiosity, discipline, and proof.

Base

Lille, France

Focus

Preparing OSCP

Mobility

International

Origin

Curiosity first.

I got my first computer at 11. I quickly started taking apart everything happening behind the screen: networking, object-oriented programming, Arduino boards... That exploration left me with solid foundations in C, a sensitivity to reverse engineering and the ability to develop in OOP — tools that, without me realizing it yet, were already preparing me for offensive security.

That same curiosity is what led me to pentesting. What started as a Sunday hobby became a genuine obsession. Today, I am completing a cybersecurity bootcamp and actively preparing for the OSCP, which I am targeting for Q3 2026.

Autonomy

Developer yesterday. Attacker tomorrow.

For a year and a half, I worked as a freelance developer building WebApps and business management solutions for companies — task automation, internal tooling for accounting firms. Several clients are still using the solutions I delivered today — which says something about the quality and durability of the work produced.

That experience gave me far more than development skills: it gave me the ability to understand how applications are built — and therefore where they break.

Today, I am able to conduct a full killchain on lab environments, from reconnaissance to complete compromise. I am now looking to bring these skills into my first professional experience in cybersecurity.

Trajectory

A progression built as a long-term commitment.

The roadmap stays simple: reinforce the foundation, validate OSCP, then move toward more demanding red team work.

Today

Offensive bootcamp

Labs, exploitation, and reporting to turn practice into a repeatable method.

Q3 2026

OSCP certification

Immediate target: prove a solid operational level in enumeration, exploitation, and reporting.

Next

OSEP & red team

Go deeper on evasion, lateral movement, and realistic attack paths.

Availability

Ready to move for the right team.

Based in Lille today, I am open internationally and ready to join the right environment, on site or remotely.

Relocation

Available

Passport

Ready

Remote

OK

Status

Immediate

06 / Contact

Looking for a penetration tester?

I'm actively seeking my first professional role in offensive security. I bring structured methodology, solid documentation habits, and a serious passion for the craft.