Offensive Security Operator — Geneva, Switzerland
YYY.
Security

Red team operations, infrastructure penetration testing,
and adversary simulation. Built on Swiss precision.

Location Geneva · Lausanne, CH
Specialisation Red Teaming · Infrastructure
Status Open to Engagements
Initiate Contact View Capabilities
01 //

Identity

Offensive security operator based in Geneva, Switzerland. I build and break infrastructure — from hardened Linux servers to complex enterprise environments.

My approach is first principles: understanding systems at the kernel level, the packet level, the byte level. I don't use tools I don't understand.

Currently pursuing OSCP certification while running an active Proxmox lab environment on dedicated Hetzner hardware. Every engagement is backed by real operational infrastructure and documented methodology.

Available for red team operations, infrastructure penetration testing, and security architecture review.

Technical Stack
Arch Linux
Kali Linux
Proxmox VE
Hetzner Cloud
nftables
Metasploit
Python · Bash
LUKS · LVM
Nginx · Caddy
Docker
02 //

Capabilities

01
Red Team Operations

Full-scope adversary simulation. I operate as a real attacker — with a methodology that mirrors APT behaviour, not checkbox compliance. Objective-based, stealth-oriented, documented.

02
Infrastructure Penetration Testing

Linux servers, network perimeters, cloud infrastructure. Internal and external assessments with complete exploitation chains and actionable remediation roadmaps.

03
Server Hardening & Architecture

Defence from the attacker's perspective. nftables, Fail2ban, SSH hardening, LUKS encryption, audit trails. Hardening that actually survives scrutiny — not just an audit checklist.

04
Security Workflow Automation

AI-augmented security pipelines. Automating reconnaissance, report generation, and detection logic — accelerating engagements without sacrificing depth or rigour.

03 //

Trust Protocol

OSCP In Progress
OSEP Planned
OSWE Planned
OSED Planned

Certifications are a signal, not a destination. The OSCP pursuit is a commitment to methodology — proving exploitation capability under controlled, verified conditions.

Every certification in this roadmap answers a specific question a high-value client will ask: can you actually do this?

Active Lab Environment
Proxmox VE 8.x on Hetzner AX41-NVMe, RAID1, production-hardened
nftables default-deny firewall with active threat intelligence integration
Arch Linux daily driver — kernel-level understanding, zero GUI dependency
Lynis audit trail: continuous hardening from score 62 → 70+
04 //

Contact

Let's talk about
your threat model.

High-value engagements only. If you're serious about your attack surface, let's have a direct conversation.