Purple Team β’ Security Research β’ AppSec β’ Cloud Security
- Purple Team: validate detections and response through threat-led, evidence-based testing
- Application Security: authentication & authorization flaws, multi-tenant SaaS risk, secure design reviews
- Cloud Security: identity-first defense, control-plane visibility, logging & monitoring strategy
- Security Research: vulnerability analysis and responsible disclosure across production platforms
- Governance & Risk: RoE, safety & deconfliction, evidence handling, remediation verification
- Member, OWASP Foundation β application security community and standards
- Contributor, UN IGF Policy Network on Cybersecurity & AI β cybersecurity, AI governance, risk frameworks
- Member, United Nations β technology, inclusion, sustainable digital transformation
- Member, Rewriting the Code β mentorship & professional development
- Member, National Cybersecurity Student Association β awareness, education, community discussions
- Volunteer, Croix-Rouge FranΓ§aise β emergency readiness, coordination, community outreach
- Certified Red Team Operations Management (CRTOM)
- Cyber Security Architecture v1
- OpSec & Anonymity for Red Teams
- Purple Team β Active Directory & AzureAD v1
- Fortinet Network Security
- FortiGate Administrator
- Microsoft Azure Security Engineer Associate (AZ-500)
- Computers and Operating Systems and Security
- Google Cybersecurity
- Technical Support Fundamentals
- Splunk Search Expert
- Certified Ethical Hacker (CEH β Cisco)
- Network Security
- Certified in Cybersecurity (CC)
- Systems Security Certified Practitioner (SSCP)
- Systems and Application Security
- Security Principles
- Security: Aligning Asset and Risk Management
- ATT&CK β telemetry β detection β response β retest loops
- Detection quality over alert volume
- Bridging technical security with governance, risk, and real-world impact
I donβt chase coverage. I chase proof.
If a control canβt be validated and retested, itβs just a rumor.



