10+ years managing complex systems. Now building security tools, learning penetration testing, and pursuing a career as an ethical hacker and Red Team operator.
I bring a unique perspective: 10+ years of operations experience combined with hands-on cybersecurity training. My goal is to become a penetration tester and ethical hacker—securing systems by thinking like an attacker.
For over 10 years, I managed agricultural operations—troubleshooting equipment, leading teams, and solving complex problems under pressure. Now I'm applying that same hands-on approach to technology.
I've deployed and maintain a complete homelab infrastructure with 24 Docker services. I'm learning Python through practical security projects. I understand Linux, networking, and security fundamentals.
What makes me different: I don't just know theory—I've built real systems that run 24/7. I've recovered from failures, optimized performance, and maintained production infrastructure. That's hands-on experience you can count on.
Transitioning into offensive security with focus on penetration testing and Red Team operations. Building skills through intensive hands-on training and practical tool development.
Certification Goals:
Current Progress:
Why I'm a Good Fit for Security:
My operations background gives me a unique advantage—I understand how systems actually work in production, how they fail, and how to think like both a defender and an attacker. I approach security with a problem-solver's mindset and hands-on experience maintaining real infrastructure.
Python Security Scanner | Deployed for Real Clients | 2024-Present
Built a comprehensive security audit tool for small business clients in the Polokwane region. OpScan performs SSL/TLS validation, security headers analysis, breach database integration (HaveIBeenPwned), and generates professional PDF reports.
Technologies: Python, Requests library, ReportLab, SSL/TLS protocols, REST APIs
Impact: Deployed for real security assessments. Identified critical misconfigurations in 80% of initial client audits.
Why I built it: Small businesses need security audits but can't afford expensive consultants. OpScan provides accessible, automated security insights with actionable recommendations.
Active Learning Platforms | Hands-On Practice | 2024-Present
Building offensive security skills through intensive hands-on training across multiple platforms:
Platforms: OverTheWire (Bandit) for Linux exploitation • PortSwigger Academy for web application penetration testing • TryHackMe for penetration testing paths • HackTheBox for real-world hacking scenarios • PicoCTF for capture the flag challenges • Wireshark for network packet analysis
Homelab Practice: DVWA, WebGoat, OWASP Juice Shop (vulnerable applications) • Isolated testing environment for exploit development • Network security analysis and packet inspection
Focus: Web app pen testing, network reconnaissance, Linux exploitation, Python security automation
24 Docker Services | Raspberry Pi 4 | Production Environment
Deployed and maintain complete homelab infrastructure running 24/7. Includes Pi-hole blocking 101,000+ malicious domains daily, WireGuard VPN for secure remote access, comprehensive monitoring with Uptime Kuma and Grafana, and 19 additional services for automation and self-hosting.
Technologies: Docker, Linux (Ubuntu), Raspberry Pi, Pi-hole, WireGuard, Grafana, Prometheus, Portainer, UFW, Fail2Ban
Key Achievement: Maintained 99%+ uptime while recovering from major system failures independently.
Security-Focused Learning | 2024-Present
Learning Python specifically for security automation and tool development. Built OpScan security audit tool as practical application. Working with security APIs, SSL/TLS libraries, and PDF report generation.
Focus: Security scripting, automation, API integration, vulnerability scanning, and building tools that solve real security problems.
Approach: Learn by building—not just tutorials. OpScan represents this philosophy: identify a real need, build a solution, deploy it for actual clients.
Seeking Entry-Level Roles: Penetration Tester • Junior Security Analyst • Red Team Operations (Trainee/Junior) • Security Testing & Assessment • Vulnerability Researcher
Available for freelance: Security automation projects • Python security scripting • Homelab setup and consulting • Security auditing (OpScan)
📚 Actively pursuing PNPT & eJPT certifications • Building pentesting skills through hands-on practice across PortSwigger, TryHackMe, HackTheBox • 🎯 Polokwane-based, open to remote or relocation