I’m a cybersecurity engineer based in France. Double degree — MSc in IT Reliability & Security from Aix-Marseille University, State Engineering Degree in Cybersecurity from ENSA Oujda.
My work spans several areas: software protection (LLVM obfuscation, compiler passes, source-level transformations), blue team infrastructure (full SOC stack deployment with Elastic, Wazuh, Suricata, MISP, TheHive), digital forensics (memory analysis, malware reverse engineering), and ICS/OT security (threat modeling on critical infrastructure incidents with MITRE ATT&CK for ICS).
What keeps me going is understanding how things break — not at an abstract level, but at the instruction level, the byte level. Whether it’s a firmware ZIP encryption scheme from 1994 or a centrifuge PLC getting its ladder logic rewritten, the question is always the same: how exactly did this happen, and why did the defender not see it coming.
> skills
// low-level & reverse engineering
// network security
// systems & virtualization
// code
// grc
// languages
> experience
- ▸Performed a mapping between NIST CSF v2 and ISO 27002:2022
- ▸Developed a NIST maturity simulator from ISO assessments
- ▸Contributed to audits, monitoring, and regional cybersecurity management
- ▸Studied code obfuscation techniques and their impact on performance (RISC-V, ARM)
- ▸Reviewed LLVM-based obfuscation tools and related academic literature
- ▸Integrated an obfuscation pass into the LLVM compilation chain
- ▸Implemented a PoC on embedded code and conducted FPGA testing
- ▸Studied static and dynamic malware analysis methods
- ▸Performed in-depth analysis of Cerber ransomware using Flare-VM
- ▸Installed and configured Cuckoo Sandbox for automated malware analysis