// BOOT SEQUENCE
000
[ok] mounting /dev/identity
[ok] verifying pgp signatures
[ok] scanning attack surface
[ok] loading threat model
[ok] initialising asset inventory
[ok] applying zero-trust policy
[ok] hardening kernel parameters
[ok] binding to port 443
[ok] nullsec operational

NULLSEC

prod.nullsec // v1.0.0
// jordan.sys · 21 · paris · open sept 2026
// GRC · BLUE TEAM · DEVSECOPS
// Securing what others overlook.
WAZUHSURICATAEBIOS RMISO 27001PFSENSEPROXMOXTERRAFORMPYTHONGHIDRANMAPSPLUNKWIRESHARKLINUX
  • WAZUH
  • SURICATA
  • EBIOS RM
  • ISO 27001
  • PFSENSE
  • PROXMOX
  • TERRAFORM
  • PYTHON
  • GHIDRA
  • NMAP
  • SPLUNK
  • WIRESHARK
  • LINUX
Trust is earned,
then documented.
CC — CERTIFIED IN CYBERSECURITY
ISC2
INTRODUCTION TO THE THREAT LANDSCAPE 3.0
FORTINET
GETTING STARTED IN CYBERSECURITY 3.0
FORTINET
TECHNICAL INTRODUCTION TO CYBERSECURITY 3.0
FORTINET
CSNA
STORMSHIELD
CCNA 1
CISCO
// aggregate profile

I don't build fortresses. I map the blind spots.

Three years through computer science and then cybersecurity. The development internships came first — interfaces, performance work, a migration from WordPress to static HTML. They were useful for understanding how systems get built under time pressure, which turns out to be directly relevant to understanding how they fail. The security focus came after, at Guardia, and sharpened into a specific interest: the space between compliance documentation and operational reality, where most security programmes produce activity rather than outcomes.

The apprenticeship at Arvato is in ISMS management — security policy, IS audits, risk and incident processes. The work is governance-layer: translating frameworks into decisions an organisation can actually execute, then maintaining the evidence that it did. The domains I am building toward are GRC, blue team operations, and DevSecOps. The overlap between them is not an accident. Policy without operational instrumentation is assumption. Detection without governance accountability is noise that no one owns. The connective tissue between them is where security actually lives.

[ github ][ linkedin ][ cv ]
// jordan.sys — securing what others overlook.