Skip to content
View oliverjueguen's full-sized avatar
  • La Coruña, Spain
  • 08:24 (UTC +02:00)

Block or report oliverjueguen

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
oliverjueguen/README.md

Oliver Jueguen

Cybersecurity | Systems & Automation | Pentesting Path

I come from a systems-first background, with solid hands-on experience in Linux and Windows environments, virtualization, and containerization.
I am currently focusing on cybersecurity, building offensive security skills on top of a strong systems foundation.

My learning style is practical: I work directly with operating systems, infrastructure, and automation to understand how systems behave, fail, and can be exploited.


What I am doing now

🎓 Master in Cybersecurity & AI – Evolve Academy
Pentesting-oriented training focused on:

  • Linux and Windows internals
  • Networking fundamentals
  • Vulnerability analysis
  • Enumeration and exploitation basics
  • Security methodology and tooling
  • Scripting and automation for security tasks

This training path is aligned with the eJPTv2 (eLearnSecurity Junior Penetration Tester) certification as the final objective.

Alongside the master, I actively work on system-level labs, virtualized environments, and containerized services to strengthen my understanding of real-world infrastructure.


Systems & Technical Background

I am particularly comfortable working with:

  • Linux systems (configuration, services, permissions, troubleshooting)
  • Windows systems (installation, optimization, hardening basics)
  • Virtualization and lab environments
  • Docker and containerized services
  • OS-level experimentation and recovery
  • Automation and scripting for system tasks

I focus on understanding how systems are built and operated, not just how to attack them.


Featured Projects

🔐 Discord CVE Monitoring Bot

A Node.js bot that monitors the National Vulnerability Database (NVD) and automatically posts HIGH and CRITICAL severity CVEs to Discord.

Project goals

  • Automate vulnerability awareness
  • Reduce noise and focus on relevant risks
  • Build security-oriented automation grounded in real systems

Key features

  • Official NVD API integration
  • Severity-based filtering
  • Persistent state to avoid duplicate alerts
  • Designed for continuous execution (PM2)

Repository:
👉 https://github.com/oliverjueguen/cve-bot


Current Focus

  • Systems and infrastructure understanding
  • Linux and Windows security fundamentals
  • Entry-level penetration testing methodology
  • Security automation and scripting
  • Lab-based learning and controlled environments

I prioritize foundations and methodology over tool spamming.


Career Direction

My goal is to start in cybersecurity roles where strong system knowledge is valued, such as:

  • Junior Pentester (entry-level)
  • Security-focused IT / Systems roles
  • Security operations roles with a technical systems focus

In the medium term, I aim to specialize in:

  • Offensive security
  • Infrastructure-focused penetration testing
  • Automation applied to security workflows

Contact

Popular repositories Loading

  1. zip2hashcat zip2hashcat Public

    Extract ZIP password hashes in native hashcat format

    Python 2 1

  2. Sarpan-Bot Sarpan-Bot Public

    JavaScript

  3. qrfroundry qrfroundry Public

    TypeScript

  4. yt-downloader yt-downloader Public

    Flask-based YouTube downloader using yt-dlp, packaged with Docker for easy deployment across different environments.

    Python

  5. cve-bot cve-bot Public

    CVE Checker Discord Bot

    JavaScript

  6. oliverjueguen oliverjueguen Public