Cybersecurity Strategy • Architecture • Operations • Intelligence

Pascal Weber (zoldax) builds security with strategic vision, operational realism and deep technical craft.

Senior cybersecurity expert, IBM Champion, architect and community contributor focused on resilient security platforms, SOC and SIEM excellence, threat-driven operations, AI for cybersecurity and high-value technical delivery.

  • Strategic Leadership
  • SOC / SIEM / SOAR
  • Threat Intelligence
  • AI & Security
pascal@zoldax:~

$ init profile --mode public

✔ strategic posture loaded

✔ security architecture modules ready

✔ threat intelligence feeds aligned

✔ AI / cyber research workspace active

$ status

Focus Cybersecurity Strategy

Turning technical complexity into structured, executive-ready security direction.

Execution Architecture & Operations

From design to deployment, tuning, hardening and continuous improvement.

About

A profile positioned between leadership, engineering and field reality.

Pascal Weber (zoldax) brings more than twenty-five years of experience across infrastructure, cybersecurity, architecture, consulting and technical leadership.

His profile combines security strategy, deep platform expertise, SOC and SIEM delivery, incident-oriented thinking, pre-sales, service structuring, team leadership and knowledge transfer.

This combination creates a rare bridge between executive vision, architecture design, operational implementation and field pragmatism.

25+ years across infrastructure, security and leadership
7+ years as IBM Champion in cybersecurity
Hybrid vision spanning strategy, architecture, delivery and operations
Expertise

Core domains where strategic thinking meets technical delivery.

Cybersecurity Strategy

Security direction shaped around business objectives, risk exposure, governance needs, resilience and execution capacity.

  • Security roadmap definition
  • Operational resilience thinking
  • Stakeholder alignment
  • Program structuring

SOC, SIEM & Detection

Strong focus on detection use cases, platform architecture, tuning, investigation workflows and operational value.

  • SOC architecture
  • SIEM engineering
  • Threat hunting support
  • Use case rationalization

Security Platforms

Experience across security ecosystems that require both technical depth and a clear understanding of integration patterns.

  • QRadar ecosystem
  • SOAR and workflow logic
  • Threat intelligence integration
  • Hybrid infrastructure security

AI & Cybersecurity

Applied work and strategic watch on how AI can support detection, knowledge management, analysis quality and future security operations.

  • AI-assisted workflows
  • Security knowledge bases
  • RAG-oriented thinking
  • Governance and trust

Leadership & Delivery

Ability to move from architecture concepts to concrete delivery, team coordination, reporting and structured execution.

  • Project and service leadership
  • Pre-sales and solution framing
  • Process improvement
  • Technical team guidance

Knowledge Transfer

Belief that strong expertise should be documented, shared and transformed into usable knowledge for others.

  • Technical publications
  • Strategic watch contributions
  • Community posts
  • Training-oriented communication
Recognition

Validated expertise, long-term recognition and continuous certification.

IBM

IBM Champion & technical advocacy

Recognized year after year for technical contribution, community leadership, blogging, mentoring and solution expertise.

CERTIFICATIONS

Breadth across security, QRadar, cloud and AI

IBM QRadar certifications, CompTIA CySA+, Palo Alto Networks PSE Cortex Professional, Guardium, watsonx, SevOne and multiple advanced technical credentials.

RESEARCH

Strategic watch and public technical writing

Author and contributor on AI & cybersecurity, EDR, CTI, incident response, QRadar automation and network hierarchy topics.

Selected signals of credibility

IBM Champion IBM Advocate IBM Contributor CompTIA CySA+ Palo Alto PSE QRadar Certified Cloud Pak Guardium watsonx SevOne
View full Credly profile
Projects & Contributions

Selected public work that reflects engineering depth and practical cybersecurity thinking.

PulseQueryViewer

Tooling

Automation work designed to help document and understand QRadar content and architecture more effectively.

Read article

NHSuite / GitHub

Open

Public repositories, utilities and experiments around monitoring, cybersecurity tooling, automation and technical labs.

Visit GitHub

AI Cyber Lab

Research

Personal experimentation environment exploring local LLMs, vector databases, knowledge bases and AI-assisted cybersecurity workflows.

Showcased on request

Strategic Watch Series

Watch

State-of-the-art publications covering AI and cybersecurity, EDR, CTI and incident response from a strategic perspective.

Published through professional channels

Network Hierarchy & Architecture

Article

Technical writing on managing network hierarchy and architectural clarity in security-oriented environments.

Read article

Large-scale security delivery

Field

Experience across public and private sector environments involving SOC, SIEM, architecture, deployment, resilience and operational support.

Delivered in client contexts
Contact

Open to technical exchange, expert discussions and cybersecurity collaborations.

For consulting discussions, architecture topics, research exchanges or community conversations, the easiest way to connect is through the channels below.