Home
Jaakko Oja
Third-year IT engineering student at Tampere University of Applied Sciences specializing in telecommunications, computer networks, and cybersecurity.
Incoming: Offensive Security Analyst - Red Team @ Accenture Nordics - Cyber Attack Simulation (May 2026)
- 2026 · In Progress
Built a custom, automated C2 pipeline optimized for ARM64 cloud instances. Instead of using default builds, my Ansible playbook mutates the source code on the fly to evade static analysis (polymorphism) and enforces strict Systemd sandboxing to run the service without root privileges. This is a currently VERSION 2! The V3 is going to use Terraform and Ligolo-ng, instead of Cloudflare Workers.
- 2026 · Completed
Implemented a fully automated deployment pipeline using Ansible to provision resilient Red Team infrastructure. Currently utilizing this environment to research MFA bypass mechanisms and session hijacking.
- 2026 · In ProgressEnterprise Sim: Game of Active Directory (GOAD)
Applying my established skills(OSCP LAB) to a massive, vulnerable enterprise environment. The goal is to practice Red Team operations across a complex network featuring multiple forests, child domains, and advanced security configurations.
- 2025 · Present
Executing full kill-chain attacks on Hack Academy's custom VMs. Focusing strictly on manual exploitation techniques to master the enumeration and lateral movement methodology required for the OSCP certification.
- 2025 · Thesis Research
In-depth thesis research exploring modern Command & Control (C2) Frameworks (with Mythic) used in Red Team Operations, receiving the highest possible grade (5/5).
- 2025 · Completed
Implementing a Security Information and Event Management (SIEM) solution using Wazuh and Suricata for real-time monitoring, alerting, and security incident response practice.
- Summer 2025 · Project
Completed a practical SDR project using CaribouLite and Raspberry Pi 4. Focused on configuring and utilizing open-source tools to analyze and interact with the SDR world.
- 2022 - PresentTampere University of Applied Sciences
Bachelor of Engineering in ICT Telecommunications and Computer Networks. Core focus on network security, infrastructure, and protocol analysis.
Red Teaming
Adversary simulation and offensive security operations
Offensive SecurityEthical Hacking
Authorized security assessments and vulnerability research
Penetration TestingSOC Operations
Security monitoring, incident response, and threat intelligence
Defensive Security Blue TeamingNetworking & SDR
Network security, protocols, and software-defined radio(SDR)
Infrastructure SDR NetworkingBachelor's Thesis Grade: 5/5
My deep dive into the Mythic C2 Framework. I constructed a complete attack infrastructure from scratch to simulate modern adversary tradecraft against both Windows and Linux targets.
The research focused on evasion techniques. I successfully demonstrated fileless execution on Linux by deploying the Poseidon agent via Bincrypter. This method utilized the memfd_create syscall to execute the payload directly from RAM, effectively bypassing disk-based detection mechanisms.
* Note: The attached thesis document is currently in Finnish.
Summer 2025 Intern Project
This was my intern project at Tampere University of Applied Sciences. Really an eye-opening exploration into the world of Software-Defined Radio (SDR).
🛡 Honeypot Attack Analysis
A month-long experiment running a Cowrie SSH honeypot on Linode that captured over 500,000 attack events from global threat actors. The project provided deep insights into botnet behavior, automated exploitation patterns, and eventually taught valuable lessons about resource management when the system hit the OOM wall.







