00000 +
Endpoints secured across hybrid multicloud with two public clouds and two on-premises datacenters
00 +
Years architecting enterprise solutions at Swiss Post, including leading Zero Trust transformation as Technical Director
000 +
Subsidiaries covered spanning logistics, finance, transportation, and e-government operations

How I Work With You
How I Work With You
Assess - Know Where You Stand
Every security transformation begins with clarity. Through structured workshops, technical reviews, and stakeholder interviews, I evaluate your environment against proven frameworks.
The output is a prioritized, actionable roadmap that accounts for your specific technical landscape, regulatory requirements, and business constraints.

Architect - Design for Reality
Strategy documents are necessary, but they are not architecture. I translate security intent into implementable designs that address your specific requirements.
For complex enterprises, this work addresses challenges that generic frameworks ignore: legacy system integration, organizational change management, and multi-year program execution.

Guide - Expert Oversight
The best architecture is worthless if implementation fails. Through vendor selection support, implementation oversight, and advisory services, I ensure your security transformation delivers outcomes.
This is not project management. It is expert oversight that catches problems before they become crises.

Ready to Transform Your Security Posture?
Whether you need a Zero Trust maturity assessment, a security architecture review, or guidance on integrating AI into your security operations, I am here to help. No sales process. No discovery calls with junior staff. Let us talk directly about your challenges.
Endpoints Secured
Across hybrid multicloud environment with two public clouds and two on-premises datacenters
Employees Protected
Spanning 100+ subsidiaries across logistics, finance, transportation, and e-government
Years of Experience
Architecting enterprise solutions at Swiss Post, including leading Zero Trust transformation