[sudo] updating & upgrading...
Initializing...

whoami

In a nutshell? Just a dude who is passionate about IT, cybersecurity and learning new stuff.


I'm graduating with a B.Eng. in Information Technology (IT Engineering) from Tampere University of Applied Sciences (TAMK), specializing in networking and telecommunications, with a secondary focus on software engineering.

I was a late bloomer in tech. As a kid, I was more interested in playing Doom than figuring out what could run it. With time (and good 6 years of selling furnitures) my curiosity to all things digital grew, so i enrolled in school with a thought of becoming software engineer, but cybersecurity cunningly drew me in.


With a late start, I had serious catching up to do. Several years grinding in Cisco Packet Tracer, learning networking protocols, Linux, Windows, programming (C++, Java), binging YouTube channels, participating in CTFs, devouring darknet diaries podcast as whole and bashing my head against THM and HTB boxes, I now can with almost full certainty say that I'm now slightly past the "valley of despair", visualized in the chart displayed next slide.

Cool chart

peak of "Mt. Stupid"
valley of despair
slope of enlightenment
plateau of sustainability

(This graph is used purely for humorous self-aware purposes)

Right now, I’m building depth in blue team operations while working as a T1/T2 SOC analyst. A big part of my day is spent inside logs, trying to decide whether an alert is real signal or just background noise. And when it’s signal, I want to understand what it’s attempting to do and how to shut it down properly.

I genuinely enjoy that process. The digging, the pattern recognition, the small details that suddenly make sense. Even the noise teaches how protocols behave, how systems communicate, what “normal” really looks like at scale. That analytical curiosity, that willingness to sit with messy data until it clicks. This is where my strength lies.

As much as I value blue team work, I’m intentionally pushing myself toward offensive security as well. I want to understand systems from both sides. My goal is to become proficient in penetration testing and eventually break into the field. This website exists mainly as a tracker of that journey - documenting the labs, the challenges, and the steady progression behind the scenes.

Experience

Junior SOC Specialist

4/2025 – current
  • Analysis of security alerts using industry-standard SIEM tools
  • Performing case triage, escalation, and containment actions
  • Implementation and maintenance of rule-based filtering to reduce false positives
  • Monitoring, analysis, and management of security events in cloud environments
  • Documentation of findings and actions, ensuring adherence to and development of security processes
  • Interpreting and researching threat intelligence, utilizing multiple OSINT tools to support investigations
  • Working as part of an experienced team while learning from seasoned security professionals

Events

Participated

  • LähiTapiola HackDay 2025
  • Faust A/D CTF 2025

Certifications

Microsoft Azure Fundamentals (AZ-900) Microsoft Security, Compliance, and Identity Fundamentals (SC-900)

Notable Courses

Cisco Networking Academy

  • CCNA
  • CyberOps Associate
  • CCNP Core Networking
  • Ethical Hacker

TryHackMe Learning Paths

  • Web Fundamentals
  • Jr Penetration Tester
  • Web Application Pentesting (In Progress)

MPK

  • Advanced Cybersecurity Course - SOC1
  • Advanced Cybersecurity Course - Forensics
  • Cybersecurity Special Course 24 (live fire)

Planned

Legendary Quest: Pwn 100 boxes

0 / 100
Precious OSCP meme
Swipe down for more