Albert Palazón
IT professional with over six years of enterprise experience, currently specializing in offensive methodologies, OSINT workflows and structured security labs.
- Documented repositories with reproducible steps and outcomes
- Security-labs repo for structured writeups and playbooks
- Methodology-first approach (enum → exploit → post → reporting mindset)
Projects
A selection of repositories currently featured on my GitHub profile.
Security Labs
Writeups and playbooks (methodology-first, not just “flags”).
- Advanced hands-on security labs (Hack The Box, TryHackMe)
- Offensive security learning paths (eCPPTv3 preparation)
- OSINT investigation workflows and tooling
- Structured, methodology-driven technical documentation
- Scope and assumptions
- Enumeration tree (ports → services → findings)
- Exploit path and alternatives tried
- Post-exploitation and proof
- Fixes and remediation notes
About
Professional background and current focus.
IT professional with over six years of experience in enterprise environments, currently transitioning into a specialized Cybersecurity role.
Background in Senior Service Desk and infrastructure support within international organizations, working with network security technologies, identity and access management and critical incident resolution.
Completed a Master’s Degree in Cybersecurity to deepen technical expertise across defensive security, risk management, OSINT and offensive methodologies.
- Advanced hands-on security labs (Hack The Box, TryHackMe)
- Offensive security learning paths (eCPPTv3 preparation)
- OSINT investigation workflows and tooling
- Structured, methodology-driven technical documentation
- Master’s Degree in Cybersecurity
- eJPTv2 (INE)
- CCSP (ISMS Forum)
- eCPPTv3 (in progress)
- Structured incident handling and analysis
- Methodology-first technical documentation
- Offensive security mindset
- Continuous hands-on practice
Contact
Fastest way: Linkedin or email.