
Ibuildsolutionsthatworkovertime.
Software, AI, and technical systems designed with criteria, not slogans.
Cybersecurity Services
Concrete protection, structured processes, and targeted interventions to reduce operational risk and improve security posture.
Vulnerability Assessment
Complete vulnerability analysis of networks, systems, and applications with detailed reports and remediation priorities.
Penetration Test
Attack simulations based on recognized methodologies to evaluate the real resilience of your infrastructure.
Supplier Security Audit
Security assessment of critical suppliers: contracts, SLAs, security postures, and supply-chain risks.
Cyber Hygiene Program
Hardening, patching, permission reviews, secure configurations, and quarterly security posture monitoring.
Security Awareness Training
Anti-phishing, social engineering, and safe device usage training, with dedicated simulations and materials.
CSIRT / Incident Response Consultant
Immediate support in case of a suspected incident: analysis, containment, recovery, and reporting.
Want to find out in detail how these services work, what benefits they offer, and which legal obligations (GDPR, minimum security measures, ISO/IEC 27001, NIS2) they can address?
→ Go to the dedicated pageServices
Serious technical support: software, infrastructure, automation, and systems that won't fail you after six months.
Custom Software
Robust and easy-to-maintain applications, designed to grow without becoming a nightmare.
SaaS Platforms
Complete projects based on APIs, cloud, and modern architectures, without unnecessary complications.
Complex Integrations
I connect old and new systems, even when they don't speak the same language. Automation included.
AI & Data Intelligence
AI analysis, models, and automations that are actually useful, not just buzzwords.
Security & Monitoring
Advanced monitoring, alerting, and technical response systems (SMX).
IT Consultancy
Architectures, scalability, cloud, performance, and sensible technical decisions.
Products
A selection of works that represent my way of building software: concrete, structured, and result-oriented.

Security Monitor X
Monitoring platform with AI, automation, and device management.
Django • Python • AI • Postgres

Stay Safe
Personal security system with real-time checks, alarms, and notifications.
Flutter • Node.js • Maps • Notifications

EasyPayCard
Cashless platform for hospitality facilities with shop, payments, and complete management.
Next.js • Prisma • Postgres • Stripe
Why work with me
A technical, practical approach focused on solving real problems, not selling standard solutions.
Cross-functional Skills
Software development, infrastructure, DevOps, and cybersecurity. This allows me to have a complete vision and reduce unnecessary dependencies and steps.
Cybersecurity and risk awareness
Experience in technical assessments, vulnerability assessments, penetration testing, and hardening, with focus on regulated contexts and security best practices.
Complex systems and integrations
I work on platforms, critical integrations, and corporate systems, not on superficial or isolated projects.
Complex systems and integrations
I work on platforms, critical integrations, and corporate systems, not on superficial or isolated projects.
Reliability and method
Clear processes, documentation, respect for deadlines, and technical choices designed to last over time.
Do you have a concrete project?
Write to me: let's understand what is really needed and what is not.
Contact me