Cybersecurity Strategy • Architecture • Operations • Intelligence

Driving security with strategic vision, operational realism, and deep technical expertise.

Designs, strengthens and delivers resilient cybersecurity platforms across SOC, SIEM, SOAR, threat-driven operations and AI-assisted security workflows. IBM Champion, Palo Alto Cortex PSE, architect and community contributor currently driving high-value cybersecurity initiatives at Abakus Sécurité.

  • Management & Strategic Leadership
  • SOC / SIEM / SOAR
  • Threat Intelligence
  • AI & Security
pascal@zoldax:~

$ init profile --mode public

strategic posture loaded

security architecture modules ready

threat intelligence feeds aligned

AI / cyber research workspace active

$ status

Focus Cybersecurity Strategy

Turning technical complexity into structured, executive-ready security direction.

Execution Architecture & Operations

From design to deployment, tuning, hardening and continuous improvement.

About

Connecting leadership, engineering and operational reality.

More than twenty-five years of experience across infrastructure, cybersecurity, architecture, consulting and technical leadership.

Shapes security strategy, leads consulting engagements, delivers SOC and SIEM platforms, structures services, supports pre-sales, guides technical teams and turns complex security subjects into actionable knowledge.

Bridges executive vision, architecture design, operational implementation and field pragmatism.

25+ years across infrastructure, security and leadership
7+ years as IBM Champion in cybersecurity
Hybrid vision spanning strategy, architecture, delivery and operations
Expertise

Core domains where strategic thinking meets technical delivery.

Cybersecurity Strategy

Security direction shaped around business objectives, risk exposure, governance needs, resilience and execution capacity.

  • Security roadmap definition
  • Operational resilience thinking
  • Stakeholder alignment
  • Program structuring

SOC, SIEM & Detection

Strong focus on detection use cases, platform architecture, tuning, investigation workflows and operational value.

  • SOC architecture
  • SIEM engineering
  • Threat hunting support
  • Use case rationalization

Security Platforms

Experience across security ecosystems that require both technical depth and a clear understanding of integration patterns.

  • QRadar ecosystem
  • SOAR and workflow logic
  • Threat intelligence integration
  • Hybrid infrastructure security

AI & Cybersecurity

Applied work and strategic watch on how AI can support detection, knowledge management, analysis quality and future security operations.

  • AI-assisted workflows
  • Security knowledge bases
  • RAG-oriented thinking
  • Governance and trust

Leadership & Delivery

Ability to move from architecture concepts to concrete delivery, team coordination, reporting and structured execution.

  • Project and service leadership
  • Pre-sales and solution framing
  • Process improvement
  • Technical team guidance

Knowledge Transfer

Belief that strong expertise should be documented, shared and transformed into usable knowledge for others.

  • Technical publications
  • Strategic watch contributions
  • Community posts
  • Training-oriented communication
Recognition

Validated expertise, long-term recognition and continuous certification.

IBM

IBM Champion & technical advocacy

Recognized year after year for technical contribution, community leadership, blogging, mentoring and solution expertise.

CERTIFICATIONS

Breadth across security, QRadar, cloud and AI

IBM QRadar certifications, CompTIA CySA+, Palo Alto Networks PSE Cortex Professional, Guardium, watsonx, SevOne and multiple advanced technical credentials.

RESEARCH

Strategic watch and public technical writing

Author and contributor on AI & cybersecurity, EDR, CTI, incident response, QRadar automation and network hierarchy topics.

Selected signals of credibility

IBM ChampionIBM AdvocateIBM ContributorCompTIA CySA+Palo Alto PSEQRadar CertifiedCloud PakGuardiumwatsonxSevOne
View full Credly profile
Projects & Contributions

Selected public work that reflects engineering depth and practical cybersecurity thinking.

PulseQueryViewer

Tooling

Automation work designed to help document and understand QRadar content and architecture more effectively.

Read article

NHSuite / GitHub

Open

Public repositories, utilities and experiments around monitoring, cybersecurity tooling, automation and technical labs.

Visit GitHub

AI Cyber Lab

Research

Personal experimentation environment exploring local LLMs, vector databases, knowledge bases and AI-assisted cybersecurity workflows.

Showcased on request

Strategic Watch Series

Watch

State-of-the-art publications covering AI and cybersecurity, EDR, CTI and incident response from a strategic perspective.

Published through professional channels

Network Hierarchy & Architecture

Article

Technical writing on managing network hierarchy and architectural clarity in security-oriented environments.

Read article

Large-scale security delivery

Field

Experience across public and private sector environments involving SOC, SIEM, architecture, deployment, resilience and operational support.

Delivered in client contexts
Contact

Open to technical exchange, expert discussions and cybersecurity collaborations.

For consulting discussions, architecture topics, research exchanges or community conversations, the easiest way to connect is through the channels below.