Florian Schüssler

Founder

Hof, Bavaria, Germany10 yrs 8 mos experience

Key Highlights

  • Founder of a specialized offensive security firm.
  • Extensive experience in cybercrime investigations.
  • Expert in Red Teaming and social engineering.
Stackforce AI infers this person is a Cybersecurity Expert specializing in offensive security and threat actor profiling.

Contact

Skills

Core Skills

PenetrationtestingRed TeamingSocial EngineeringPenetrationstestsCybersecurity

Other Skills

Physical AssessmentsVulnerability AssessmentLive HackingThreat Detection & AnalysisIncident Response WorkflowSIEM Querying & InvestigationHost-Based ForensicsSplunkLateral Movement DetectionAdvanced AD Attack ChainsCredential HarvestingDomain PersistenceKiosk Breakout TechniquesSystem EnumerationAccess Restriction Evasion

About

To stop a breach, you have to understand the logic behind the attack. My professional journey began where cybersecurity meets real-world criminal investigation: at the Criminal Police Baden-Württemberg (Kriminalpolizei). As a Cybercrime Investigator, I spent years analyzing the aftermath of digital crimes, reconstructing complex attack paths, and profiling the motives of threat actors. This experience taught me that security is never just a technical challenge—it’s a psychological and physical one. I learned to see the world through the eyes of an adversary, focusing on the paths of least resistance that others often overlook. Transitioning to the private sector, I deepened this perspective through Red Teaming, Social Engineering, and Physical Assessments. My goal has always been to move beyond "checkbox compliance" and build true, battle-tested resilience. Along the way, I’ve backed this hands-on experience with advanced certifications, including OSCP, CRTO, CRTP, and CESE, particularly in high-stakes environments like Critical Infrastructure (KRITIS). The next step in this mission is Access Granted. I founded Access Granted to provide organizations with a partner that thinks like a real-world intruder. We combine technical precision with the investigative mindset I developed in law enforcement. Our focus is holistic: we don't just test your code; we test your people and your physical perimeters to ensure that your security strategy holds up when it actually matters. I believe that true resilience is built on transparency, expertise, and a deep understanding of the human factor. Think like an attacker, act as a partner.

Experience

10 yrs 8 mos
Total Experience
2 yrs 1 mo
Average Tenure
2 mos
Current Experience

Accessgranted x gmbh

CEO & Founder

Mar 2026Present · 2 mos

  • Leading a specialized offensive security firm dedicated to high-end penetration testing and adversary simulation.
  • Designing and executing multi-vector assessments, focusing on the intersection of technical, physical, and human-centric security.
  • Leveraging former law enforcement investigative experience to provide unique threat-actor profiling and realistic attack scenarios for SME and Critical Infrastructure (KRITIS) clients.
  • Directing the technical strategy and ensuring the highest quality standards for all security engagements and reporting.
PenetrationtestingRed TeamingSocial EngineeringPhysical AssessmentsVulnerability Assessment

Exploit labs

2 roles

Technical Team Lead

Promoted

Feb 2025Mar 2026 · 1 yr 1 mo

  • Leading the technical direction and strategic development of the Red Team unit, overseeing processes, toolchains, and operational workflows to enhance overall efficiency and precision.
  • Responsible for planning and executing advanced Red Team operations, social engineering campaigns, and physical security assessments, with a strong focus on engagements targeting critical infrastructure (KRITIS) and high-security environments.
  • Actively mentoring and training upcoming penetration testers, guiding them through OffSec certification paths and real-world adversary simulation methodologies.
  • Key contributions:
  • Established internal frameworks for Red Team methodologies and reporting standards
  • Developed and integrated custom tools and automation workflows to improve engagement efficiency
  • Led multi-vector assessments combining cyber, physical, and human-factor testing for KRITIS clients
Red TeamingSocial Engineering

Senior Pentester / Red Teamer / Trainer

Nov 2024Jan 2025 · 2 mos

  • Conducted and led penetration tests, Red Team engagements, and social engineering / physical intrusion simulations across various industries — including critical infrastructure (KRITIS), finance, and healthcare.
  • Trained and mentored junior security consultants in offensive security techniques, focusing on practical, threat-based approaches and real-world scenarios.
  • Highlights:
  • Delivered high-impact Red Team operations simulating nation-state-level adversaries
  • Executed social engineering campaigns (email, phone, onsite) for awareness and resilience testing
  • Designed and led internal workshops and OffSec-oriented training sessions
PenetrationstestsCybersecurityRed Teaming

It total - ein unternehmen der datagroup

Senior IT-Security Consultant

Aug 2023Oct 2024 · 1 yr 2 mos

  • Conducting penetration tests with a focus on social engineering and physical assessments.
PenetrationstestsLive HackingCybersecurityPhysical Assessments

Msg

Senior Business Consultant / Penetration Tester

Apr 2023Jul 2023 · 3 mos

  • Conducting penetration tests, specifically web application penetration testing.
PenetrationstestsLive HackingCybersecurity

It total ag

IT-Security Consultant

Oct 2020Mar 2023 · 2 yrs 5 mos · Rottweil, Baden-Württemberg, Germany

  • Conducting penetration tests with a focus on social engineering, physical assessments, and comprehensive infrastructure tests. In addition to primary pentesting activities, also worked in system house operations.
PenetrationstestsLive HackingCybersecurity

Criminal police

Cybercrime Investigator (Criminal Police)

Oct 2017Sep 2020 · 2 yrs 11 mos · Rottweil, Baden-Württemberg, Germany

  • Led and coordinated complex cybercrime investigations within the Criminal Investigation Department, focusing on digital forensics, threat actor profiling, and incident correlation.
  • Conducted in-depth forensic analyses, system evaluations, and data recovery processes to support prosecution and intelligence-driven investigations. Collaborated closely with prosecutors, IT experts, and national law enforcement units to trace and dismantle organized cybercrime structures.
  • During this period, I also developed a deep technical understanding of penetration testing methods and attacker behavior, which now form the foundation of my work in offensive security and Red Teaming.
  • Key contributions:
  • Led multi-layered investigations involving digital forensics, network intrusion, and OSINT analysis
  • Supported national and cross-agency efforts in cybercrime prevention and evidence reporting
  • Built internal technical workflows for digital evidence handling and analysis
  • Translated investigative insights into practical offensive security strategies
Live HackingCybersecurity

Hewlett packard enterprise

Dual Student

Oct 2014Sep 2017 · 2 yrs 11 mos · Böblingen, Baden-Württemberg, Deutschland

  • Contract archiving, localization optimization, app development for events (e.g. CeBIT), foundational work on penetration testing, Bad USB, and development of streaming software.
Cybersecurity

Education

Baden-Wuerttemberg Cooperative State University (DHBW)

Bachelor of Science - BS — Applied Computer Science

Jan 2014Jan 2017

IHK Akademie Schwarzwald-Baar-Heuberg

Master Professional of Technical Management — Technischer Betriebswirt

Jan 2024Jan 2025

Stackforce found 100+ more professionals with Penetrationtesting & Red Teaming

Explore similar profiles based on matching skills and experience