Penetration Tester & Cybersecurity Engineer
[ About me ]
I'm a Computational Systems Engineer with deep expertise in cybersecurity, specially offensive security. I conduct full-scope pentests, red team engagements and vulnerability research across web, network, Active Directory, and cloud environments.
I follow industry methodologies including PTES, OSSTMM, OWASP, ISSAF, and NIST 800-115, and I have a strong background in security governance, compliance, and AppSec auditing (SAST, DAST, SCA). I try to stay up to date doing CTFs and trainings.
Beyond computers, I like reading, cycling, and tea culture. I play the piano sometimes. Started hiking in 2026. I'm fluent in english (TOEFL C1 ↗) and french (DELF B2 ↗), and beginner in japanese.
[ Work history ]
Offensive security engagements and cybersecurity engineering across multiple organizations.
[ Expertise ]
Offensive security methodologies, tooling, and engineering built across real-world engagements.
[ My Work ]
Security tooling and personal projects I'm proud of.
Note: Since building this website, I'm just uploading to Github many old projects.
[ Writing ]
Thoughts on malware development, offensive security, and the industry, published on Medium.
[ Accomplishments ]
Trainings, certifications and courses completed across offensive security, cloud, governance, and engineering. Playing Pokemon as a kind got me an addition to collecting digital badges; you can see mine on Credly ↗.
[ Let's connect ]
Whether you want to collaborate,
or just want to say hi, my inbox is open.