Hi! I'm Daniel Aunan
Cybersecurity enthusiast passionate about penetration testing, network security, and building secure systems. Explore my projects, learn more about my work, and feel free to reach out!
Cybersecurity enthusiast passionate about penetration testing, network security, and building secure systems. Explore my projects, learn more about my work, and feel free to reach out!
I'm Daniel, a Cybersecurity enthusiast currently working as an OT Network Technician at Intility in Oslo. I hold a double master's degree in Computer & Network Engineering from INSA Toulouse and Security of Computer Systems from TLS-SEC. I specialize in penetration testing, network security, and CTF challenge development, with experience working at EUROCONTROL's EATM-CERT securing critical aviation infrastructure.
Learn more about meMy main focus areas are penetration testing, network and OT security, and practical security engineering. I enjoy working close to real systems — understanding how things actually work, where they break, and how attackers think — especially in high-impact environments like aviation and industrial systems.
I’ve worked in diverse environments ranging from aviation cybersecurity at EUROCONTROL (EATM-CERT), to OT network operations at Intility, and software development at AutoStore. This mix allows me to bridge development, operations, and security rather than treating them as isolated disciplines.
I regularly work with tools such as Nmap, Burp Suite, Wireshark, and various cloud and container security tools. I’m comfortable scripting in Python and Bash, and I have experience with Java and C. On the infrastructure side, I have a strong networking background and Cisco CCNA certification.
I’m part of a newly founded OT team where I contribute to building secure platforms for operational technology. My work involves monitoring, incident response, network operations, and applying security best practices to environments where availability and safety are critical.
I approach security from both an attacker and defender perspective. I enjoy threat modeling, hands-on testing, and turning findings into practical mitigations. I value clear communication — especially when explaining risks and solutions to non-security stakeholders.
I continuously learn through hands-on projects, CTFs, research, and real-world problem solving. My academic research includes work on malicious container images and supply-chain attacks in Kubernetes environments, and I actively keep up with emerging threats and techniques.
I’m comfortable working in multidisciplinary and international teams. I’ve collaborated with engineers, operators, and security professionals across Europe, and I value clear documentation, structured workflows, and knowledge sharing as much as technical skill.