Cybersecurity Analyst Portfolio - David Ethevenaux

Portrait of David Welcome to my portfolio!

About

Learn more about me.

The digital world has always been a playground for my curiosity and action. After gaining skills in project management and web development, I chose to specialize in cybersecurity. I know I made the right choice because time flies when I'm securing infrastructures, solving challenges (like on RootMe), or participating in "Capture The Flag" competitions.

I love understanding systems as a whole. My journey, marked by diverse experiences (from heavy industry to services), has taught me adaptability and cross-functional collaboration. As a pedagogue, I strive to make digital accessible, always aligning technical solutions with real-world needs.

Open to opportunities (SOC analyst, IT auditor, consultant), I want to invest in concrete projects. If you're looking for a curious profile, able to analyze technical issues in the morning and lead cross-functional projects in the afternoon, feel free to contact me to discuss over a coffee (virtual or real!).

Skills

My toolbox.

OS

Tux Logo Windows Logo
Kali Logo Parrot OS Logo

Scan & Collect

Nmap Logo Dimitry Logo
TheHarvester Logo DNS Recon Logo Wireshark Logo

Intrusion & Exploit

Macchanger Logo Metasploit Logo Burp Suite Logo Nikto Logo Dirb Logo Cadaver Logo

Cryptanalysis

Hashcat Logo
Hydra Logo John the Ripper Logo

Education

My journey in a few steps.

Cybersecurity Analyst
M2i
2026
Specialization in penetration testing and digital forensics. I developed expertise in offensive and defensive security, covering network security, incident management, and vulnerability analysis. Through real-world simulations, I learned to identify vulnerabilities and strengthen infrastructure resilience.
Master 2 in Project Management
Université Paris Est
2009
Learned to structure and manage complex projects, with a focus on governance and risk management. I developed business continuity (BCP) and disaster recovery (DRP) plans through impact analysis. This systemic approach strengthened my ability to identify organizational vulnerabilities and ensure process resilience, always user and customer oriented.

Portfolio

My playground.

RootMe Screenshot
Root Me
Learning platform dedicated to Hacking and Information Security

- Current score: 630
- Challenges solved: 59

Hackable II Screenshot
CTF Hackable II
Target machine: Linux VM - Source: vulnhub.com

I analyzed an unknown VM (Black Box), exploited its vulnerabilities (scans, SQL injection, privilege escalation), and gained root access to retrieve the flag, documenting each step (see report above).

Contact

Let's talk.

View my CV

Form

Get in touch.