Turning technical complexity into structured, executive-ready security direction.
Driving security with strategic vision, operational realism, and deep technical expertise.
Designs, strengthens and delivers resilient cybersecurity platforms across SOC, SIEM, SOAR, threat-driven operations and AI-assisted security workflows. IBM Champion, Palo Alto Cortex PSE, architect and community contributor currently driving high-value cybersecurity initiatives at Abakus Sécurité.
- Management & Strategic Leadership
- SOC / SIEM / SOAR
- Threat Intelligence
- AI & Security
$ init profile --mode public
✔ strategic posture loaded
✔ security architecture modules ready
✔ threat intelligence feeds aligned
✔ AI / cyber research workspace active
$ status
From design to deployment, tuning, hardening and continuous improvement.
Connecting leadership, engineering and operational reality.
More than twenty-five years of experience across infrastructure, cybersecurity, architecture, consulting and technical leadership.
Shapes security strategy, leads consulting engagements, delivers SOC and SIEM platforms, structures services, supports pre-sales, guides technical teams and turns complex security subjects into actionable knowledge.
Bridges executive vision, architecture design, operational implementation and field pragmatism.
Core domains where strategic thinking meets technical delivery.
Cybersecurity Strategy
Security direction shaped around business objectives, risk exposure, governance needs, resilience and execution capacity.
- Security roadmap definition
- Operational resilience thinking
- Stakeholder alignment
- Program structuring
SOC, SIEM & Detection
Strong focus on detection use cases, platform architecture, tuning, investigation workflows and operational value.
- SOC architecture
- SIEM engineering
- Threat hunting support
- Use case rationalization
Security Platforms
Experience across security ecosystems that require both technical depth and a clear understanding of integration patterns.
- QRadar ecosystem
- SOAR and workflow logic
- Threat intelligence integration
- Hybrid infrastructure security
AI & Cybersecurity
Applied work and strategic watch on how AI can support detection, knowledge management, analysis quality and future security operations.
- AI-assisted workflows
- Security knowledge bases
- RAG-oriented thinking
- Governance and trust
Leadership & Delivery
Ability to move from architecture concepts to concrete delivery, team coordination, reporting and structured execution.
- Project and service leadership
- Pre-sales and solution framing
- Process improvement
- Technical team guidance
Knowledge Transfer
Belief that strong expertise should be documented, shared and transformed into usable knowledge for others.
- Technical publications
- Strategic watch contributions
- Community posts
- Training-oriented communication
Validated expertise, long-term recognition and continuous certification.
IBM Champion & technical advocacy
Recognized year after year for technical contribution, community leadership, blogging, mentoring and solution expertise.
Breadth across security, QRadar, cloud and AI
IBM QRadar certifications, CompTIA CySA+, Palo Alto Networks PSE Cortex Professional, Guardium, watsonx, SevOne and multiple advanced technical credentials.
Strategic watch and public technical writing
Author and contributor on AI & cybersecurity, EDR, CTI, incident response, QRadar automation and network hierarchy topics.
Selected signals of credibility
Selected public work that reflects engineering depth and practical cybersecurity thinking.
PulseQueryViewer
ToolingAutomation work designed to help document and understand QRadar content and architecture more effectively.
Read articleNHSuite / GitHub
OpenPublic repositories, utilities and experiments around monitoring, cybersecurity tooling, automation and technical labs.
Visit GitHubAI Cyber Lab
ResearchPersonal experimentation environment exploring local LLMs, vector databases, knowledge bases and AI-assisted cybersecurity workflows.
Showcased on requestStrategic Watch Series
WatchState-of-the-art publications covering AI and cybersecurity, EDR, CTI and incident response from a strategic perspective.
Published through professional channelsNetwork Hierarchy & Architecture
ArticleTechnical writing on managing network hierarchy and architectural clarity in security-oriented environments.
Read articleLarge-scale security delivery
FieldExperience across public and private sector environments involving SOC, SIEM, architecture, deployment, resilience and operational support.
Delivered in client contextsOpen to technical exchange, expert discussions and cybersecurity collaborations.
For consulting discussions, architecture topics, research exchanges or community conversations, the easiest way to connect is through the channels below.