Cybersecurity Portfolio

Hi, I'm Alphonse.

~/profile.sh

Interactive Terminal

Explore this portfolio like a tiny shell. Try: help, whoami, projects, skills, contact, clear.

~/portfolio$
visitor@63n713m4n:~$

About Me

Cybersecurity Master's student based in Sweden, mixing academic depth with hands‑on labs, CTFs, and real‑world security projects.

Interests span threat intelligence, penetration testing, OSINT, and security architecture, with a growing focus on IoT and automotive security.

Outside of hacking and hardening, there is a love for flight simulators, tech tinkering, and turning complex security topics into accessible stories through blogs and write‑ups.

Skills & Focus

View mode

Currently showing a mix of offensive and defensive skills. Toggle to focus on one side.

Security Skills

  • Penetration Testing
  • Vulnerability Assessment
  • Incident Response
  • Security Architecture

Technical Skills

  • Network Security
  • Cloud Security (AWS / Azure)
  • SIEM Tools
  • Python & Bash scripting

Interests

  • Threat Intelligence & Analysis
  • OSINT
  • Secure network and system design
  • CTFs & practical lab‑based learning

Currently hacking on

  • Deepening web exploitation workflows and methodologies
  • IoT and automotive security fundamentals
  • Turning academic work into practical, reusable security assets

Projects

Selected academic and practical projects that reflect current interests in IoT, automotive security, and applied cybersecurity research.

📡 IoT Security Analysis Project

Context. Analyzed vulnerabilities in smart siren and light devices during the Cybersecurity Exchange Program at the University of Twente.[file:38]

What I did.

  • Mapped device attack surface and communication flows
  • Identified exposure and misconfigurations in device behavior
  • Applied practical threat modeling to prioritize weaknesses

Impact. Produced a comprehensive report with remediation strategies and concrete security recommendations for hardening the IoT setup.[file:38]

View IoT Project Report (PDF)

🚘 ISO/SAE 21434 Industry Implementation Review

Context. Academic literature review on how organizations implement ISO/SAE 21434 for automotive cybersecurity in real environments.[file:38]

What I did.

  • Surveyed industry papers on TARA and lifecycle security processes
  • Compared effectiveness measurement approaches and gaps
  • Evaluated current automation tooling across the vehicle lifecycle

Impact. Highlighted adoption challenges, measurement blind‑spots, and where automation helps or fails, forming a base for future research.[file:38]

View Literature Review (PDF)

🧪 Labs, CTFs & Ongoing Work

Context. Continuous practice environment across small labs, CTFs, and notes used to build intuition and repeatable workflows.

What I do.

  • Set up focused labs around web, network, and OSINT scenarios
  • Work through CTF challenges targeted at fundamentals
  • Capture methodologies and mistakes in structured write‑ups

Impact. Builds real muscle memory and personal playbooks rather than just theoretical knowledge.

Labs & CTF Mindset

Homelab & experiments

Minimal homelab used to simulate attacks, collect logs, and observe how activity looks from the defender’s point of view.

Includes experiments with basic log collection, simple detections, and documenting how different kinds of noise show up in telemetry.

CTF approach

Treats CTFs as a training ground for structured thinking: recon → enumeration → exploitation → reporting, not just “guessing the trick”.[web:84]

Focused on challenges that map to real‑world skills: web vulns, misconfigurations, simple privilege escalation, and OSINT trails.

Certifications

Google Cybersecurity Professional

Issued: 2023 – foundational coverage of security operations, incident response, and common tools and processes.

View Certificate

Cisco CyberOps Associate

Issued: 2025 – focuses on SOC operations, monitoring, detection, and response in modern networked environments.

View Credential

TryHackMe Progress

Hands‑on practice on TryHackMe to build offensive and defensive skills in a guided, lab‑based environment.[web:96]

TryHackMe Profile

Regularly completing rooms focused on web exploitation, privilege escalation, networking, and blue‑team fundamentals.[web:96]

View TryHackMe profile

Focused Rooms & Paths

Working through beginner‑to‑intermediate paths and rooms that strengthen fundamentals and mirror real‑world attack chains.[web:84]

  • Intro and fundamentals paths to solidify basics
  • Web exploitation and enumeration‑heavy rooms
  • Privilege escalation and post‑exploitation labs

Blogs & Write‑ups

Long‑form notes and reflections live on Medium, where projects, paths into cybersecurity, and core concepts are broken down for others starting their journey.

Breaking into Cybersecurity

A beginner’s guide to launching a cybersecurity career, mapping out skills, mindset, and practical steps into the field.

Read on Medium

Navigating the World of Cybersecurity

Deep dive into controls, frameworks, and compliance, and how they fit together in real security programs.

Read on Medium

Medium Profile

More write‑ups, experiments, and reflections on security topics as the journey continues.

View Medium profile

Site Changelog

This portfolio is treated like a living lab. A few recent changes:

2026‑01

  • Redesigned hero and whoami terminal block.
  • Added hidden web CTF page with client‑side flag checker.
  • Created particle‑based interactive thank‑you page.

2025

  • Completed Cisco CyberOps Associate certification.
  • Extended IoT and ISO/SAE 21434 research sections.

Let's Connect

Always open to discussing new projects, cybersecurity challenges, or collaboration opportunities.

The best way to get in touch is via LinkedIn, but GitHub and Medium are great places to see what is being worked on.

Send a message