Home

Home

Jaakko Oja

Jaakko Oja

Purple Team Mindset // Network Security Enthusiast

Third-year IT engineering student at Tampere University of Applied Sciences specializing in telecommunications, computer networks, and cybersecurity.

Currently open for roles: Junior Cybersecurity Consultant · Red Team Operator · SOC Specialist · Junior Networking · Threat Hunter ·

Call-to-Action? Sure thing! Contact me on LinkedIn or by email:
Available for opportunities · Tampere, Finland
Degree Progress (TAMK) 182 / 240 ECTS (75.8%)
Timeline
  • 2026 · Planned
    Evilginx: Reverse-Proxy Phishing

    Researching and building a controlled lab to understand and demonstrate session hijacking and Multi-Factor Authentication (MFA) bypass mechanisms via reverse-proxy phishing attacks.

  • 2026 · Planned (Spring)
    Enterprise Sim: Game of Active Directory (GOAD)

    Applying my established skills(OSCP LAB) to a massive, vulnerable enterprise environment. The goal is to practice Red Team operations across a complex network featuring multiple forests, child domains, and advanced security configurations.

  • 2025 · Present

    Executing full kill-chain attacks on Hack Academy's custom VMs. Focusing strictly on manual exploitation techniques to master the enumeration and lateral movement methodology required for the OSCP certification.

  • 2025 · Thesis Research

    In-depth thesis research exploring modern Command & Control (C2) Frameworks (with Mythic) used in Red Team Operations, receiving the highest possible grade (5/5).

  • 2025 · Q4

    Implementing a Security Information and Event Management (SIEM) solution using Wazuh and Suricata for real-time monitoring, alerting, and security incident response practice.

  • Summer 2025 · Project

    Completed a practical SDR project using CaribouLite and Raspberry Pi 4. Focused on configuring and utilizing open-source tools to analyze and interact with the SDR world.

  • 2022 - Present
    Tampere University of Applied Sciences

    Bachelor of Engineering in ICT Telecommunications and Computer Networks. Core focus on network security, infrastructure, and protocol analysis.

Core Skills

Red Teaming

Adversary simulation and offensive security operations

Offensive Security

Ethical Hacking

Authorized security assessments and vulnerability research

Penetration Testing

SOC Operations

Security monitoring, incident response, and threat intelligence

Defensive Security Blue Teaming

Networking & SDR

Network security, protocols, and software-defined radio(SDR)

Infrastructure SDR Networking
Thesis: Command & Control Frameworks

Bachelor's Thesis Grade: 5/5

My deep dive into the Mythic C2 Framework. I constructed a complete attack infrastructure from scratch to simulate modern adversary tradecraft against both Windows and Linux targets.

The research focused on evasion techniques. I successfully demonstrated fileless execution on Linux by deploying the Poseidon agent via Bincrypter. This method utilized the memfd_create syscall to execute the payload directly from RAM, effectively bypassing disk-based detection mechanisms.

* Note: The attached thesis document is currently in Finnish.

📄
Click here for the Thesis Research!
PDF • Research Paper
🌟 Intern Project: CaribouLite & Raspberry Pi 4

Summer 2025 Intern Project

This was my intern project at Tampere University of Applied Sciences. Really an eye-opening exploration into the world of Software-Defined Radio (SDR).

📄
Click here for the official project report!
PDF • 2.5 MB
📥 Download PDF
🛡 Honeypot

🛡 Honeypot Attack Analysis

A month-long experiment running a Cowrie SSH honeypot on Linode that captured over 500,000 attack events from global threat actors. The project provided deep insights into botnet behavior, automated exploitation patterns, and eventually taught valuable lessons about resource management when the system hit the OOM wall.

🍯
Read the full Honeypot Chronicles
Threat Hunting • Attack Analysis • OOM Debugging
🏅 Certifications
Introduction to Cybersecurity
Introduction to Cybersecurity
CyberOps Associate
CyberOps Associate
Ethical Hacker
Ethical Hacker
CCNA SRWE
CCNA SRWE
CCNA ENSA
CCNA ENSA: Enterprise Networking, Security & Automation
Azure Fundamentals
Azure Fundamentals
Cybersecurity Architect
Cybersecurity Architect
ISC2 Candidate
ISC2 Candidate
🔗 My links!

© 2025 Jaakko Oja – All rights reserved.