Panther ASOC
An automated, scalable open-source SOC environment focused on proactive detection, response, IAM integration, hardening, and resilience.
I work at the intersection of authentication, authorization, access governance, cloud IAM architecture, and practical system integration.
Based in Brussels and open to US opportunities, I help organizations design identity flows that are secure, understandable, and resilient enough for real delivery constraints.

+50%
domain/team growth contribution
5,000+
identities impacted by MFA rollout
15+
applications covered by privilege elevation policies
6
working languages
Recruiter clarity, technical depth, freelance credibility.
Featured projects
Project pages are structured as case studies: context, architecture, trade-offs, security considerations, outcomes, and lessons learned.
An automated, scalable open-source SOC environment focused on proactive detection, response, IAM integration, hardening, and resilience.
A controlled research project exploring customizable and obfuscated reverse shell shellcode generation in Python and x86_64 assembly.
Experience highlights
Recent work spans domain leadership, banking IAM architecture, MFA and SSO delivery, AD governance, and endpoint security operations.
February 2026 - Present
Amaris Consulting
Contributed to +50% domain and team growth while strengthening offerings, delivery assets, recruitment, and pre-sales positioning.
October 2025 - Present
Amaris Consulting / Confidential Banking Client
Creates developer-ready specifications that align architects, engineering teams, and business stakeholders around secure IAM delivery.
September 2023 - September 2025
Fnac Darty
Delivered MFA coverage for 5,000+ identities, migrated 250+ users across 3 countries, and designed privilege elevation policies for 15+ applications.
How I work
I connect identity protocols, enterprise constraints, and delivery artifacts so security decisions can move from architecture to implementation.
Identity strategy, architecture framing, target-state design, and decision support for identity-centric security programs.
Practical design of SSO, MFA, OAuth2, OIDC, PKCE, mTLS, token validation, and API gateway integration patterns.
Role model design, permission mapping, access governance flows, and review patterns that remain maintainable.
Specification of joiner, mover, leaver, onboarding, password lifecycle, logout, and identity data synchronization flows.
Assessment of authentication, access governance, privileged access, identity data quality, monitoring, and delivery practices.
Clear architecture documentation, API constraints, data models, decision records, and delivery-ready security specifications.
Latest writing
The blog is designed for technical articles, architecture notes, and documentation-style case writeups.
A practical draft on MFA rollout architecture, adoption risk, fallback paths, identity grouping, and measurable delivery.
A practical draft on when role-based access control works, when attributes help, and why maintainability matters more than purity.
A technical draft on token structure, claim minimization, enrichment logic, API gateway constraints, and validation responsibilities.
I am open to US opportunities, consulting, freelance missions, and collaboration around IAM, authentication, access governance, and security architecture.