$ whoami
Fjona Mekaj
Cyber Security Graduate
I refine systems until they behave, then I lock them down.
$ cat about.txt
About
Cyber Security graduate from Høyskolen Kristiania. I've always been curious about how systems work, and what happens when they don't. I'm especially interested in how technology, people, and security interact, and how design decisions affect security in practice.
My background combines computer science and cybersecurity, with experience in programming, network defense, risk management, and ethical hacking. I enjoy understanding how systems are built, identifying weaknesses, and improving them in a structured and practical way.
→ motivated by clarity, precision, and continuous learning.
$ ls ./skills/
Skills
[+] Offensive & Analysis
Recon · vulnerability scanning · web app testing · exploitation · privilege escalation
[+] Secure Engineering
Secure coding · input validation · access control · security-by-design · hardening
[+] Tools & Automation
Scripting · test automation · data collection · workflow efficiency
[+] Reporting
Clear findings · risk levels · evidence · practical mitigations · technical & non-technical audiences
[+] Incident Response
Detection · log analysis · structured response · documentation · lessons learned
[+] Ethics & Practice
Responsible disclosure · confidentiality · legal boundaries · continuous learning
$ cat experience.txt
Experience
[+] Cyber Security Intern
Jan 2026 – presentVerdane / MittAnbud · Oslo
[+] Dental Secretary
Nov 2022 – presentTannfeen · Drammen
$ ls ./projects/
Projects
[+] Local Password Audit Tool
Browser-based password analysis tool. Runs fully locally, evaluates entropy, identifies weak patterns, suggests stronger alternatives. No data ever leaves the client.
[+] World Explorer — Cyber Map
Interactive D3.js world map with cybersecurity profiles per country, national CERTs, major incidents, disclosure practices, and live CVE data from public APIs.
[+] Web Application Penetration Test - Boris LockPicks
Full web application pentest conducted as an academic exam. Documents vulnerabilities, risk levels, and actionable recommendations.
$ ls ./training/
Training & Platforms
[+] TryHackMe
FjonaM · Level 5 — Visionary
Actively completing rooms in penetration testing, web exploitation, and network security.
[+] HackTheBox
FjonaM
Practicing offensive security through machines and challenges in a real-world lab environment.
[+] Microsoft Azure
25 modules completed
Completed modules covering cloud architecture, security, Kubernetes, Docker, IoT, DDoS protection, and disaster recovery.
[+] Courses & Certifications
Introduction to Cybersecurity
Cisco · feb. 2024
Learn Java: Object-Oriented Programming
Codecademy · mai 2024
Learn JavaScript Course
Codecademy · nov. 2023
Learn HTML Course
Codecademy · nov. 2023
Learn CSS Course
Codecademy · nov. 2023
Learn SQL Course
Codecademy · nov. 2023
$ contact --list