Home
Jaakko Oja
Third-year IT engineering student at Tampere University of Applied Sciences specializing in telecommunications, computer networks, and cybersecurity.
Currently open for roles: Junior Cybersecurity Consultant · Red Team Operator · SOC Specialist · Junior Networking · Threat Hunter ·
- 2026 · PlannedEvilginx: Reverse-Proxy Phishing
Researching and building a controlled lab to understand and demonstrate session hijacking and Multi-Factor Authentication (MFA) bypass mechanisms via reverse-proxy phishing attacks.
- 2026 · Planned (Spring)Enterprise Sim: Game of Active Directory (GOAD)
Applying my established skills(OSCP LAB) to a massive, vulnerable enterprise environment. The goal is to practice Red Team operations across a complex network featuring multiple forests, child domains, and advanced security configurations.
- 2025 · Present
Executing full kill-chain attacks on Hack Academy's custom VMs. Focusing strictly on manual exploitation techniques to master the enumeration and lateral movement methodology required for the OSCP certification.
- 2025 · Thesis Research
In-depth thesis research exploring modern Command & Control (C2) Frameworks (with Mythic) used in Red Team Operations, receiving the highest possible grade (5/5).
- 2025 · Q4
Implementing a Security Information and Event Management (SIEM) solution using Wazuh and Suricata for real-time monitoring, alerting, and security incident response practice.
- Summer 2025 · Project
Completed a practical SDR project using CaribouLite and Raspberry Pi 4. Focused on configuring and utilizing open-source tools to analyze and interact with the SDR world.
- 2022 - PresentTampere University of Applied Sciences
Bachelor of Engineering in ICT Telecommunications and Computer Networks. Core focus on network security, infrastructure, and protocol analysis.
Red Teaming
Adversary simulation and offensive security operations
Offensive SecurityEthical Hacking
Authorized security assessments and vulnerability research
Penetration TestingSOC Operations
Security monitoring, incident response, and threat intelligence
Defensive Security Blue TeamingNetworking & SDR
Network security, protocols, and software-defined radio(SDR)
Infrastructure SDR NetworkingBachelor's Thesis Grade: 5/5
My deep dive into the Mythic C2 Framework. I constructed a complete attack infrastructure from scratch to simulate modern adversary tradecraft against both Windows and Linux targets.
The research focused on evasion techniques. I successfully demonstrated fileless execution on Linux by deploying the Poseidon agent via Bincrypter. This method utilized the memfd_create syscall to execute the payload directly from RAM, effectively bypassing disk-based detection mechanisms.
* Note: The attached thesis document is currently in Finnish.
Summer 2025 Intern Project
This was my intern project at Tampere University of Applied Sciences. Really an eye-opening exploration into the world of Software-Defined Radio (SDR).
🛡 Honeypot Attack Analysis
A month-long experiment running a Cowrie SSH honeypot on Linode that captured over 500,000 attack events from global threat actors. The project provided deep insights into botnet behavior, automated exploitation patterns, and eventually taught valuable lessons about resource management when the system hit the OOM wall.







