Skip to main content

Your network has grown by successive additions over 15 years. Nobody knows exactly what talks to what. A security incident reveals vulnerabilities nobody suspected.

I audit and restructure network architectures — segmentation, filtering, remote access, multi-site interconnections. I deploy reverse proxies and authentication gateways using proven open source tools (Traefik, Nginx, Fail2ban, Wazuh).