Operations Professional | Aspiring Penetration Tester

HI, I'M JOHAN
TRANSITIONING FROM
FARM OPERATIONS TO
CYBERSECURITY

10+ years managing complex systems. Now building security tools, learning penetration testing, and pursuing a career as an ethical hacker and Red Team operator.

From Managing Operations to Building Technology

I bring a unique perspective: 10+ years of operations experience combined with hands-on cybersecurity training. My goal is to become a penetration tester and ethical hacker—securing systems by thinking like an attacker.

24
Docker Services Running
10+
Years Experience
99%
Homelab Uptime

About Me

For over 10 years, I managed agricultural operations—troubleshooting equipment, leading teams, and solving complex problems under pressure. Now I'm applying that same hands-on approach to technology.

I've deployed and maintain a complete homelab infrastructure with 24 Docker services. I'm learning Python through practical security projects. I understand Linux, networking, and security fundamentals.

What makes me different: I don't just know theory—I've built real systems that run 24/7. I've recovered from failures, optimized performance, and maintained production infrastructure. That's hands-on experience you can count on.

Career Direction

🎯 Becoming a Penetration Tester & Ethical Hacker

Transitioning into offensive security with focus on penetration testing and Red Team operations. Building skills through intensive hands-on training and practical tool development.

Certification Goals:

Current Progress:

Why I'm a Good Fit for Security:

My operations background gives me a unique advantage—I understand how systems actually work in production, how they fail, and how to think like both a defender and an attacker. I approach security with a problem-solver's mindset and hands-on experience maintaining real infrastructure.

Skills & Technologies

Infrastructure

  • Docker & Container Management
  • Linux System Administration
  • Raspberry Pi Deployment
  • Network Configuration
  • System Monitoring (24/7)

Programming

  • Python (Security Automation)
  • Bash Scripting
  • Git & Version Control
  • Command Line Tools
  • Security Scripts

Security & Penetration Testing

  • Penetration Testing (Learning)
  • Web Application Security (PortSwigger)
  • Network Packet Analysis (Wireshark)
  • Python Security Automation (OpScan)
  • Linux Exploitation (OverTheWire)
  • Vulnerability Assessment
  • Security Auditing (OpScan deployments)
  • OWASP Top 10
  • Red Team Mindset

Operations

  • Problem Solving
  • Team Leadership (10+ years)
  • Systems Maintenance
  • Independent Work
  • Process Optimization

What I've Built

OpScan Security Audit Tool

Python Security Scanner | Deployed for Real Clients | 2024-Present

Built a comprehensive security audit tool for small business clients in the Polokwane region. OpScan performs SSL/TLS validation, security headers analysis, breach database integration (HaveIBeenPwned), and generates professional PDF reports.

Technologies: Python, Requests library, ReportLab, SSL/TLS protocols, REST APIs

Impact: Deployed for real security assessments. Identified critical misconfigurations in 80% of initial client audits.

Why I built it: Small businesses need security audits but can't afford expensive consultants. OpScan provides accessible, automated security insights with actionable recommendations.

Penetration Testing & Offensive Security Training

Active Learning Platforms | Hands-On Practice | 2024-Present

Building offensive security skills through intensive hands-on training across multiple platforms:

Platforms: OverTheWire (Bandit) for Linux exploitation • PortSwigger Academy for web application penetration testing • TryHackMe for penetration testing paths • HackTheBox for real-world hacking scenarios • PicoCTF for capture the flag challenges • Wireshark for network packet analysis

Homelab Practice: DVWA, WebGoat, OWASP Juice Shop (vulnerable applications) • Isolated testing environment for exploit development • Network security analysis and packet inspection

Focus: Web app pen testing, network reconnaissance, Linux exploitation, Python security automation

Personal Homelab Infrastructure

24 Docker Services | Raspberry Pi 4 | Production Environment

Deployed and maintain complete homelab infrastructure running 24/7. Includes Pi-hole blocking 101,000+ malicious domains daily, WireGuard VPN for secure remote access, comprehensive monitoring with Uptime Kuma and Grafana, and 19 additional services for automation and self-hosting.

Technologies: Docker, Linux (Ubuntu), Raspberry Pi, Pi-hole, WireGuard, Grafana, Prometheus, Portainer, UFW, Fail2Ban

Key Achievement: Maintained 99%+ uptime while recovering from major system failures independently.

Python Security Development

Security-Focused Learning | 2024-Present

Learning Python specifically for security automation and tool development. Built OpScan security audit tool as practical application. Working with security APIs, SSL/TLS libraries, and PDF report generation.

Focus: Security scripting, automation, API integration, vulnerability scanning, and building tools that solve real security problems.

Approach: Learn by building—not just tutorials. OpScan represents this philosophy: identify a real need, build a solution, deploy it for actual clients.

Let's Work Together

Seeking Entry-Level Roles: Penetration Tester • Junior Security Analyst • Red Team Operations (Trainee/Junior) • Security Testing & Assessment • Vulnerability Researcher

Available for freelance: Security automation projects • Python security scripting • Homelab setup and consulting • Security auditing (OpScan)

📚 Actively pursuing PNPT & eJPT certifications • Building pentesting skills through hands-on practice across PortSwigger, TryHackMe, HackTheBox • 🎯 Polokwane-based, open to remote or relocation