Turning technical complexity into structured, executive-ready security direction.
Pascal Weber (zoldax) builds security with strategic vision, operational realism and deep technical craft.
Senior cybersecurity expert, IBM Champion, architect and community contributor focused on resilient security platforms, SOC and SIEM excellence, threat-driven operations, AI for cybersecurity and high-value technical delivery.
- Strategic Leadership
- SOC / SIEM / SOAR
- Threat Intelligence
- AI & Security
$ init profile --mode public
✔ strategic posture loaded
✔ security architecture modules ready
✔ threat intelligence feeds aligned
✔ AI / cyber research workspace active
$ status
From design to deployment, tuning, hardening and continuous improvement.
A profile positioned between leadership, engineering and field reality.
Pascal Weber (zoldax) brings more than twenty-five years of experience across infrastructure, cybersecurity, architecture, consulting and technical leadership.
His profile combines security strategy, deep platform expertise, SOC and SIEM delivery, incident-oriented thinking, pre-sales, service structuring, team leadership and knowledge transfer.
This combination creates a rare bridge between executive vision, architecture design, operational implementation and field pragmatism.
Core domains where strategic thinking meets technical delivery.
Cybersecurity Strategy
Security direction shaped around business objectives, risk exposure, governance needs, resilience and execution capacity.
- Security roadmap definition
- Operational resilience thinking
- Stakeholder alignment
- Program structuring
SOC, SIEM & Detection
Strong focus on detection use cases, platform architecture, tuning, investigation workflows and operational value.
- SOC architecture
- SIEM engineering
- Threat hunting support
- Use case rationalization
Security Platforms
Experience across security ecosystems that require both technical depth and a clear understanding of integration patterns.
- QRadar ecosystem
- SOAR and workflow logic
- Threat intelligence integration
- Hybrid infrastructure security
AI & Cybersecurity
Applied work and strategic watch on how AI can support detection, knowledge management, analysis quality and future security operations.
- AI-assisted workflows
- Security knowledge bases
- RAG-oriented thinking
- Governance and trust
Leadership & Delivery
Ability to move from architecture concepts to concrete delivery, team coordination, reporting and structured execution.
- Project and service leadership
- Pre-sales and solution framing
- Process improvement
- Technical team guidance
Knowledge Transfer
Belief that strong expertise should be documented, shared and transformed into usable knowledge for others.
- Technical publications
- Strategic watch contributions
- Community posts
- Training-oriented communication
Validated expertise, long-term recognition and continuous certification.
IBM Champion & technical advocacy
Recognized year after year for technical contribution, community leadership, blogging, mentoring and solution expertise.
Breadth across security, QRadar, cloud and AI
IBM QRadar certifications, CompTIA CySA+, Palo Alto Networks PSE Cortex Professional, Guardium, watsonx, SevOne and multiple advanced technical credentials.
Strategic watch and public technical writing
Author and contributor on AI & cybersecurity, EDR, CTI, incident response, QRadar automation and network hierarchy topics.
Selected signals of credibility
Selected public work that reflects engineering depth and practical cybersecurity thinking.
PulseQueryViewer
ToolingAutomation work designed to help document and understand QRadar content and architecture more effectively.
Read articleNHSuite / GitHub
OpenPublic repositories, utilities and experiments around monitoring, cybersecurity tooling, automation and technical labs.
Visit GitHubAI Cyber Lab
ResearchPersonal experimentation environment exploring local LLMs, vector databases, knowledge bases and AI-assisted cybersecurity workflows.
Showcased on requestStrategic Watch Series
WatchState-of-the-art publications covering AI and cybersecurity, EDR, CTI and incident response from a strategic perspective.
Published through professional channelsNetwork Hierarchy & Architecture
ArticleTechnical writing on managing network hierarchy and architectural clarity in security-oriented environments.
Read articleLarge-scale security delivery
FieldExperience across public and private sector environments involving SOC, SIEM, architecture, deployment, resilience and operational support.
Delivered in client contextsOpen to technical exchange, expert discussions and cybersecurity collaborations.
For consulting discussions, architecture topics, research exchanges or community conversations, the easiest way to connect is through the channels below.