
From my fascination with video games to mastering lines of code, my passion for technology has led me to a career where I now protect digital secrets. I am also proficient in :
Dev Apps & Web security
Gourvernance & Risk Management
Compliance and regulations
Vulnerability audit & Pentest
• Penetration testing on external, internal and wireless networks.
• Security testing of web and mobile applications.
• Network security architecture reviews.
• Code review.
• Vulnerability remediation.
• Writing documentation (POC, presentations, etc.) for different contacts: technical or professional.
• Training in Pentest and Phishing Campaign.
• Implementation of an information security management system (iso-27001).
• Development and implementation of cybersecurity policies.
• Identification of potential threats and assessment of cybersecurity risks (Ebios RM).
• Implementation of monitoring mechanisms and management of security incidents (iso-27005).
• Compliance assessments to ensure security policies are followed.
• MOA assistance in the selection/choice of project solutions
• Assurance that the company is in compliance with cybersecurity and data protection regulations (GDPR, ISO-27001).
• Definition of security requirements, such as access management, backups and log monitoring.
• Management of business continuity within an organization. (PCA and PRA)
• Training in GRC and Information Security Awareness.
Non-exhaustive list of a variety of tools to assess the security of IT systems and to help organizations manage their governance processes, assess risks and ensure compliance with regulations.
Do you have a project, a specific need, or a question? Don't hesitate to contact me by selecting a time slot to discuss it over the phone or via video.