- I'm working at JobCloud as a Security Engineer
- ๐ Graduated from ETH Zurich and EPFL, with coursework spanning hardware, software, security, and machine learning.
Positioned across Software, Support, Management and Cloud, Iโm constantly learning and adapting to serve as an effective security middle point. My work spans both hands-on technical tasks and the communication and coordination needed to align different teams and priorities.
On the side, I'm doing a bit of software work both to keep my skills fresh and for my own fun.
- My daily work => L1โL2-L3 incident response, threat modeling, and software design reviews, AWS and Microsoft 365 security (Entra ID, Defender, Purview), Bug bounty handling. , external report reviews, Disaster recovery, support audits and compliance efforts... I could go on forever about the wide lists of tasks of a classic security engineer in a company built around software.
๐ ๏ธ Travian Automation Bot
I built a fully automated system for Travian, a classic browser strategy game โ mostly to have fun, streamline gameplay, and sharpen my software skills.
๐ Check out the repo here
This bot reverse-engineers both the API and HTML layers of the game. It authenticates with auto-retry logic, parses GraphQL responses, and interacts with form-based endpoints to simulate real user actions. I implemented modular raid planning with persistent configurations, support for multiple factions with unit mapping, and multithreaded logic to handle hero dispatching independently from troop usage.
It parses unstructured oasis data, estimates combat difficulty by analyzing animal types and counts, and can even simulate raids by querying Travianโs internal fight simulator โ letting you plan attacks without risking actual units. The system is modular and extensible, with room to support more tribes, building automation, and full resource management.
โ๏ธ If you're curious about game automation, scraping, or building your own strategy bot โ take a look at the source!
๐ ๏ธ Email CHanary Breach detection
Scripts we wrote in powershell & python to make it easier to set up email canaries in employee address books. This allows us to identify if an employee has been a victim of a business email compromise and is sending mails to the entirety of it's address book, including the canary shared mailbox that has been created on the company microsoft exchange environment. We use this tool at both Bug Bounty Switzerland and Jobcloud. Feel free to set it up for your own organisation ;)
https://github.com/grennault/emailCHanary
- Identifying Recrystallization in Stainless Steel Using Machine Learning on Acoustic Data โ EPFL project for the Laboratory of Thermomechanical Metallurgy of EPFL under PHD Claire Navarre
- Estimating the Robustness of Deep Learning Fraud Detection on the Ethereum Blockchain Against Attackers with a Leaked Model โ EPFL project for the Decentralized and Distributed Systems Lab.
