Junior Cybersecurity Professional

Security Operations & Offensive Security Foundations

Hands-on cybersecurity training focused on detection, monitoring, and incident understanding.

Growing specialization in offensive security and penetration testing, supported by defensive tooling to study how attacks are detected, investigated, and mitigated in real-world environments.

"Whois"... Me

After several years in IT operations and technical support, I transitioned deliberately into cybersecurity. My primary interest is offensive security, but I deliberately built defensive lab environments (SOC-style monitoring, log analysis, IDS) to deeply understand attacker behavior from the detection and response side.
My focus is on building practical security skills through controlled environments, with particular attention to how attacker techniques are identified and investigated by defensive systems.
I value clear processes, technical rigor, and continuous improvement.

  • Knowledge of major operating system infrastructures.

  • Excellent understanding of networking and network infrastructures.

  • Good knowledge of application security, network protocols, and common vulnerabilities.

  • Familiarity with frameworks and standards such as OWASP Top 10, MITRE ATT&CK, NIST, and CVSS.

  • Experience with penetration testing tools and frameworks such as Metasploit, Nmap, and Nessus.

  • Experience with SOC softwares like Wazuh, Suricata and Slack.

  • Familiarity with programming languages such as Java and Python, and scripting languages such as Bash.

  • Excellent command of the English language (advanced/fluent, spoken and written).

  • Basic knowledge of German, Dutch, and Spanish.


Jan. 2023 - Present

Full-time cybersecurity training focused on Security Operations and defensive monitoring, combining academic studies in Cybersecurity Engineering in Rome with structured hands-on lab environments.

Activities include log analysis, alert investigation, basic incident triage, and network traffic inspection in controlled environments, with attention to detection logic and attacker behavior.

In parallel with defensive training, I actively practice offensive security and penetration testing.
I hold a practical ethical hacking certification (CPEH) and have performed penetration testing activities during university courses in network security and cybersecurity.
I regularly practice on platforms such as Hack The Box, focusing on reconnaissance, vulnerability discovery, and exploitation fundamentals in controlled environments.
This offensive practice strengthens my understanding of attacker behavior and improves my defensive and detection-oriented mindset.
This experience represents a deliberate transition into cybersecurity, aimed at building solid foundations before operating in a production SOC environment.

Jan. 2019 – Jan. 2023 Eden srl – San Miniato (PI), Italy

Roles and Responsabilities

  • IT Manager: Provided technical support for company IT systems, including operating system installations, data recovery, and hardware/software setup and configuration. Managed technical assistance for computers, servers, and audiovisual equipment.
  • Gained experience as an ethical hacker, specializing in proactive vulnerability identification. Conducted vulnerability assessments on company systems and applications, and implemented security measures to strengthen the protection of internal networks and overall infrastructure resilience.


Jan. 2014 - Dec. 2018 Eden srl – San Miniato (PI), Italy

Roles and Responsabilities

  • Accounting: Recorded incoming and outgoing invoices, managed F24 tax procedures, maintained general ledger entries, and prepared documentation for tax filings (Form 770) and accounting records.
  • Administrative Support: Handled calls and correspondence, managed documentation and internal communications, organized meetings and appointments, drafted reports and minutes, and maintained archives and document cataloguing.

Key Achievements

  • Successfully implemented IT infrastructures to manage large volumes of property-related data, enabling fast, secure, and accurate responses to technical and accounting requests.
  • Improved the security and reliability of systems managing sensitive data.

Jan. 2012 – dec. 2014 Various companies – Multiple roles in different sectors

Roles and Responsabilities

  • Warehouse assistant, gardener, and event steward for public events.

2023 -- Ongoing

  • Bachelor’s Degree in Information Engineering – Cybersecurity, Guglielmo Marconi University -- Rome (RM), Italy 2006 (Expected 2026)
  • High School Diploma in Business and Foreign Languages, F. Enriques Institute -- Castelfiorentino (FI), Italy

Courses and Certifications

  • Certified Professional Ethical Hacker (CPEH), Information Systems Security Technician (Professional Profile Reference UNI 11621-4:2024), Issued by CybersecurityUp – Rome (CERTIFICATION No. CPEH2024103101)

  • Cisco CCNA 200-301 and Linux L-PIC1 -- Currently in progress

  • Ine Security EJPT, penetration testing -- Currently in progress

  • Ethical Hacking, Anonymity, Issued by Italian Ethical Hackers

  • Ask Questions to Make Data-Driven Decisions, Issued by Google Academy (ID. RKGZD4RHN64W)

  • Foundations: Data, Data Everywhere, Issued by Coursera (ID. NR4LYHUZNRZ3)

  • Portfolio Managment, Issued by Starting Finance (Project Portfolio Managment)



Programming and Markup Languages: Java, Python, HTML, Bash scripting

Kali Linux Tools: Nmap, Metasploit, Nessus, OpenVAS, BurpSuite, and all major penetration testing tools


SOC and Monitoring Tools: Wazuh, Suricata, Slack with webhook integration

Virtualization Tools: VmWare, Virtualbox

English: C1 level – spoken, written, and reading comprehension (enhanced through study stays in Australia, England)

Dutch, German, Spanish: A1 level – good understanding of written texts

Italian: Native Language