I’ve always been driven by a simple question: How can we make this better? My journey started in the world of physics and software architecture, where I learned to appreciate the elegance of complex systems. Over the years, that curiosity evolved into a passion for defending those systems.
I don’t just look at security through a lens of compliance or checklists. To me, true security is a living process—one that requires continuous improvement and a proactive mindset. I thrive on the challenge of outsmarting potential threats by thinking like an attacker. Whether I’m designing a global security strategy or performing a deep-dive penetration test, my goal is the same: to build a digital environment where businesses can innovate without fear.
Certified Professional Penetration Tester: Expert in identifying and exploiting vulnerabilities in web applications and network infrastructures.
Vulnerability Management: Proactive detection and mitigation of security risks through internal testing practices.
Security Hardening: Translating pentest results into actionable hardening strategies for Cloud and Endpoint environments.
ISMS Leadership: Full-cycle implementation from initial risk analysis to successful certification.
Risk Management: Designing frameworks that align security controls with actual business risk profiles.
Compliance & Audits: Bridging the gap between technical reality and regulatory requirements.
Stay ahead of evolving legal requirements. My rapid assessment tools offer a first glance at whether your business falls under current mandates.
Important: These checkers are designed for initial guidance and should not be used as a substitute for professional legal advice. Use the results to prioritize your next steps and engage with a specialist like me ;) for a deep-dive audit.