Professional Journey

Helping Secure
The Digital Landscape

From infrastructure foundations to architecting enterprise security validation frameworks

🏗️
Security Architect
📅
Since 2008
🎓
12 Certifications

Professional Profile

I am a cybersecurity architect with over 17 years of experience designing and implementing comprehensive security validation frameworks. My work focuses on helping organizations measure and strengthen their resilience against real-world threats through digital forensics, threat hunting, and breach and attack simulation.

Over the years, I've had the opportunity to collaborate with leading cybersecurity vendors and enterprise clients across Europe, developing end-to-end solutions that combine innovation, practicality, and compliance. I thrive on transforming complex challenges into scalable architectures that enable organizations to detect, respond to, and defend against evolving threats.

My career has been built around continuous learning and technical excellence. From hands-on digital forensics and incident response to large-scale architecture design, I've worked across the full spectrum of cybersecurity operations. I hold a degree in Cybersecurity and Forensics and have completed advanced certifications across multiple security disciplines.

What drives me most is a simple truth: it's not about if you get attacked, it's about your readiness when it happens. How are your defenses behaving under pressure? Are they validated against real-world threats? I focus on creating measurable, repeatable processes that continuously test and improve security posture — helping organizations move from uncertainty to confidence in their defensive capabilities.

Career Timeline

June 2025 - Present

Solution Architect

Cybersecurity Solutions Provider

Leading solution architecture initiatives for enterprise security validation frameworks. Designing comprehensive Breach and Attack Simulation (BAS) strategies that enable organizations to continuously measure security posture against real-world threats. Implementing CTEM (Continuous Threat Exposure Management) programs and providing strategic guidance on security validation using MITRE ATT&CK methodology. Collaborating with CISOs and security leaders to architect resilient security programs.

BAS Architecture CTEM Frameworks MITRE ATT&CK Mapping Security Validation Enterprise Architecture Risk Assessment Threat Modeling Purple Teaming Attack Surface Management Security Orchestration NIST CSF Zero Trust Architecture
2024 - June 2025

Customer Success Manager

Cybersecurity Solutions Provider

Delivered technical customer success initiatives, bridging advanced security solutions with customer needs. Supported adoption of breach and attack simulation platforms for enterprise clients, providing expert guidance on security validation strategies. Enabled customers to maximize value from security investments through hands-on implementation support and strategic advisory.

BAS Platform Implementation Security Assessment Customer Engagement Technical Consulting Red/Blue Team Operations Compliance Mapping Threat Intelligence Security Automation KPI Development
2013 - 2024

Technical Customer Success Engineer

Enterprise Security Solutions

Over 11 years providing expert technical guidance on cybersecurity implementations, incident response, and security operations. Specialized in digital forensics methodologies, threat hunting operations, and advanced security analysis. Developed deep expertise in evidence collection, memory analysis, and forensic investigation techniques while supporting critical security incidents.

Digital Forensics (DFIR) Threat Hunting Incident Response Memory Forensics Malware Analysis Log Analysis (SIEM) Volatility Framework Splunk/ELK EnCase/FTK Wireshark/tcpdump Timeline Analysis IOC Development Threat Intelligence 11 Years
2012 - 2013

Technical Support Engineer

Security Technology Provider

Provided advanced technical support for enterprise security products and solutions. Troubleshot complex security issues, implemented security best practices, and developed technical documentation. Built foundation in security product architecture and customer-facing technical communication.

Security Product Support Troubleshooting & Debugging Endpoint Security Security Configuration Technical Documentation Customer Training Windows Security Network Diagnostics
2008 - 2012

Infrastructure Engineer

Enterprise IT Services

Designed and implemented secure infrastructure solutions for enterprise environments. Managed network security architecture, established security protocols, and built foundational expertise in infrastructure security. This role established the technical foundation for my cybersecurity career.

Infrastructure Design Network Security System Architecture Firewall Configuration VPN/IPSec IDS/IPS Deployment Active Directory Windows Server Linux Administration Network Segmentation Cisco/Juniper VMware/Hyper-V
2007 - 2008

System Integrator Trainer

Technology Training Services

Trained system integrators on security best practices and implementation methodologies. Conducted workshops and developed comprehensive training materials for secure system integration. Began building expertise in security education and knowledge transfer.

Technical Training Security Best Practices System Integration Curriculum Development Workshop Facilitation IT Security Fundamentals

Certifications & Training

Continuous professional development through specialized security training

🛠️
Advanced Hacker Tools, Techniques, Exploits, and Incident Handling
SANS Institute

Advanced penetration testing methodologies, exploitation techniques, and comprehensive incident response procedures for identifying and mitigating sophisticated cyber threats.

🖥️
Enterprise Incident Response for Windows Environments
Industry Certification

Windows-focused incident response, investigating security breaches in enterprise environments, analyzing Windows artifacts, and conducting forensic investigations across Active Directory infrastructure.

🌐
Network Traffic Analysis and Monitoring
Industry Certification

Deep packet inspection, protocol analysis, network anomaly detection, and traffic pattern analysis using tools like Wireshark, tcpdump, and Zeek for identifying malicious network activity.

🔍
Cyber Intelligence Foundations and Threat Hunting
Industry Certification

Proactive threat hunting methodologies, cyber threat intelligence analysis, IOC development, and hypothesis-driven investigations to identify advanced persistent threats before they cause damage.

🎯
Creative Red Teaming and Breach Simulation
Industry Certification

Adversarial attack simulation, creative exploitation techniques, and red team operations to test organizational defenses using real-world attack scenarios and MITRE ATT&CK tactics.

🔬
Fundamentals of Forensics
Industry Certification

Digital forensics fundamentals including evidence preservation, chain of custody, file system analysis, data recovery, and forensic examination procedures for cybercrime investigations.

🛡️
Managed Security Services
Industry Certification

Security operations center (SOC) operations, SIEM management, security monitoring, alert triage, and coordinated incident response for managed security service providers.

🦠
Introduction to Malware Binary Analysis
Industry Certification

Reverse engineering malware, static and dynamic analysis techniques, disassembly, debugging, and behavioral analysis to understand malicious code functionality and capabilities.

🔐
Introduction to Malware Forensics
Industry Certification

Malware forensic investigation techniques, memory forensics, persistence mechanisms, artifact analysis, and reconstructing attack timelines from malware-compromised systems.

🔒
Techniques for Security in IP Networks
Industry Certification

Network security architecture, firewall configuration, IDS/IPS deployment, VPN technologies, network segmentation, and defense-in-depth strategies for IP-based infrastructures.

💾
Database Backup and Recovery Fundamentals
Industry Certification

Database resilience, backup strategies, disaster recovery planning, point-in-time recovery, and business continuity for enterprise database systems and critical data assets.

💰
Malicious Software and Underground Economy Overview
Industry Certification

Cybercrime ecosystem analysis, dark web operations, malware-as-a-service, ransomware economics, threat actor motivations, and underground marketplace dynamics.

Professional Philosophy

📚

Continuous Learning

Cybersecurity evolves rapidly. I maintain a commitment to continuous learning through hands-on practice, certifications, and community engagement.

🎯

Practical Focus

Theory meets practice. I emphasize actionable security strategies that deliver measurable improvements to organizational security posture.

🤝

Knowledge Sharing

Security is a team sport. I believe in sharing knowledge, building community, and elevating the entire security profession.

Let's Connect

Interested in discussing security architecture, breach and attack simulation, or collaboration opportunities?

Get in Touch View Skills