00000 +
Endpoints integrated into one coherent Zero Trust framework across hybrid multicloud
0000 +
Campus locations spanning Swiss and international operations
00000 +
Employees protected across 100+ subsidiaries in logistics, finance, transportation, and e-government

How I Work With You
How I Work With You
Assess - Know Where You Stand
Every security transformation begins with clarity. Through structured workshops, technical reviews, and stakeholder interviews, I evaluate your environment against proven frameworks.
The output is a prioritized, actionable roadmap that accounts for your specific technical landscape, regulatory requirements, and business constraints.

Architect - Design for Reality
Strategy documents are necessary, but they are not architecture. I translate security intent into implementable designs that address your specific requirements.
For complex enterprises, this work addresses challenges that generic frameworks ignore: legacy system integration, organizational change management, and multi-year program execution.

Guide - Expert Oversight
The best architecture is worthless if implementation fails. Through vendor selection support, implementation oversight, and advisory services, I ensure your security transformation delivers outcomes.
This is not project management. It is expert oversight that catches problems before they become crises.

Ready to Transform Your Security Posture?
Whether you need a Zero Trust maturity assessment, a security architecture review, or guidance on integrating AI into your security operations, I am here to help. No sales process. No discovery calls with junior staff. Let us talk directly about your challenges.
End Customers
B2C, B2B, and B2E user populations served
Subsidiaries
Each with varying security maturity integrated
Public Domains
Secured across the enterprise footprint