Currently: Busy with Master Thesis

Hi, I'm Alphonse

|

Scroll
visitor@63n713m4n: ~
visitor@63n713m4n:~$ whoami
Cybersecurity Researcher
visitor@63n713m4n:~$ cat skills.txt
▸ Penetration Testing
▸ Threat Intelligence
▸ OSINT & Recon
▸ IoT Security
visitor@63n713m4n:~$ _

Interactive Terminal

Explore this portfolio like a real shell. Try commands like help, whoami, ls

visitor@63n713m4n:~/portfolio
Welcome to 63n713m4n's Portfolio Terminal v2.0
Type 'help' for available commands

visitor@63n713m4n:~$

About Me

Cybersecurity Master's student in Sweden, mixing academic depth with hands-on labs, CTFs, and real-world security projects.

My interests span threat intelligence, penetration testing, OSINT, and security architecture, with a growing focus on IoT and automotive security.

Outside of hacking and hardening, I love flight simulators, tech tinkering, and turning complex security topics into accessible stories through blogs and write-ups.

0
TryHackMe Rooms
0
IoT Devices Analyzed
0
Security Projects
0
Certifications

Skills & Arsenal

Offensive Security

🎯

Penetration Testing

🕸️

Web Exploitation

🔍

OSINT

Defensive Security

🚨

Incident Response

🏗️

Security Architecture

📊

SIEM Tools

Technical Skills

🐍

Python & Bash

🌐

Network Security

☁️

Cloud Security

Tech Stack

Featured Projects

📡

IoT Security Analysis

Analyzed vulnerabilities in smart siren and light devices, identifying critical exposure and misconfigurations.

IoT Threat Modeling Security Analysis
15+ devices tested
12 vulnerabilities found
View Report →
🚘

ISO/SAE 21434 Review

Industry implementation review of automotive cybersecurity standards and TARA processes.

Automotive Compliance Research
20+ papers reviewed
5 key gaps identified
View Paper →
🛡️

Network Worm Containment

Azure NSG implementation demonstrating worm containment through network segmentation.

Azure Network Security Cloud
3 attack scenarios
95% containment rate

Labs & CTF

🏠

Homelab Environment

Minimal homelab for simulating attacks, collecting logs, and observing defender's perspective.

  • Log collection & analysis pipeline
  • Basic detection rules & alerts
  • Attack simulation scenarios
  • Telemetry noise analysis
🎯

CTF Methodology

Structured approach: Recon → Enumeration → Exploitation → Reporting

  • Web vulnerability exploitation
  • Privilege escalation techniques
  • OSINT investigations
  • Configuration auditing
🏆

TryHackMe Progress

100+
Rooms Completed
Top 5%
Global Ranking
View TryHackMe Profile →

Certifications

🎓

Cisco CyberOps Associate

SOC operations, monitoring, detection, and response in modern networked environments

2025
View Credential →
🛡️

Google Cybersecurity Professional

Security operations, incident response, and foundational security tools and processes

2023
View Certificate →

Blogs & Write-ups

Career Guide

Breaking into Cybersecurity

A beginner's guide to launching a cybersecurity career, mapping out skills, mindset, and practical steps.

Read on Medium →
Deep Dive

Cybersecurity Frameworks

Exploring controls, frameworks, and compliance, and how they fit together in real security programs.

Read on Medium →

More insights and experiments on security topics

View All Posts on Medium →

Let's Connect

Always open to discussing new projects, cybersecurity challenges, or collaboration opportunities.