Cybersecurity Portfolio

Albert Palazón

IT professional with over six years of enterprise experience, currently specializing in offensive methodologies, OSINT workflows and structured security labs.

Offensive Security OSINT Detection & Monitoring Structured Methodology
Highlights
  • Documented repositories with reproducible steps and outcomes
  • Security-labs repo for structured writeups and playbooks
  • Methodology-first approach (enum → exploit → post → reporting mindset)
4
Pinned projects
Writeups in progress

Security Labs

Writeups and playbooks (methodology-first, not just “flags”).

Current focus
  • Advanced hands-on security labs (Hack The Box, TryHackMe)
  • Offensive security learning paths (eCPPTv3 preparation)
  • OSINT investigation workflows and tooling
  • Structured, methodology-driven technical documentation
Writeup template (what I include)
  • Scope and assumptions
  • Enumeration tree (ports → services → findings)
  • Exploit path and alternatives tried
  • Post-exploitation and proof
  • Fixes and remediation notes

About

Professional background and current focus.

Professional Summary

IT professional with over six years of experience in enterprise environments, currently transitioning into a specialized Cybersecurity role.

Background in Senior Service Desk and infrastructure support within international organizations, working with network security technologies, identity and access management and critical incident resolution.

Completed a Master’s Degree in Cybersecurity to deepen technical expertise across defensive security, risk management, OSINT and offensive methodologies.

Current Focus
  • Advanced hands-on security labs (Hack The Box, TryHackMe)
  • Offensive security learning paths (eCPPTv3 preparation)
  • OSINT investigation workflows and tooling
  • Structured, methodology-driven technical documentation
Certifications and Training
  • Master’s Degree in Cybersecurity
  • eJPTv2 (INE)
  • CCSP (ISMS Forum)
  • eCPPTv3 (in progress)
Core Strengths
  • Structured incident handling and analysis
  • Methodology-first technical documentation
  • Offensive security mindset
  • Continuous hands-on practice

Contact

Fastest way: Linkedin or email.