Skip to content
MB
Open to roles / consulting

Cybersecurity & IAM engineer building secure identity systems for enterprise environments.

I work at the intersection of authentication, authorization, access governance, cloud IAM architecture, and practical system integration.

Based in Brussels and open to US opportunities, I help organizations design identity flows that are secure, understandable, and resilient enough for real delivery constraints.

Local time in Brussels--:--:--
Mahmoud Boujbiri

+50%

domain/team growth contribution

5,000+

identities impacted by MFA rollout

15+

applications covered by privilege elevation policies

6

working languages

Recruiter clarity, technical depth, freelance credibility.

IAM domain strategy and internal practice growthOAuth2, OIDC, PKCE, mTLS, token validation, and Apigee integration patternsMFA, SSO, RBAC, AD governance, access reviews, and identity lifecycle designBrussels-based, multilingual, and open to US security roles

Featured projects

Projects that show how I think.

Project pages are structured as case studies: context, architecture, trade-offs, security considerations, outcomes, and lessons learned.

SOCDetection EngineeringIAM

Panther ASOC

An automated, scalable open-source SOC environment focused on proactive detection, response, IAM integration, hardening, and resilience.

Proxmox VEpfSenseActive DirectoryWazuhAnsible
View case study
Offensive ResearchShellcodePython

Venom

A controlled research project exploring customizable and obfuscated reverse shell shellcode generation in Python and x86_64 assembly.

Pythonx86_64 AssemblyLinux SyscallsRich CLIPayload Encoding
View case study

Experience highlights

IAM, cybersecurity, and enterprise delivery.

Recent work spans domain leadership, banking IAM architecture, MFA and SSO delivery, AD governance, and endpoint security operations.

February 2026 - Present

Cybersecurity & IAM Domain Manager

Amaris Consulting

Contributed to +50% domain and team growth while strengthening offerings, delivery assets, recruitment, and pre-sales positioning.

October 2025 - Present

Technical Analyst / Cybersecurity & IAM Technical Analyst

Amaris Consulting / Confidential Banking Client

Creates developer-ready specifications that align architects, engineering teams, and business stakeholders around secure IAM delivery.

September 2023 - September 2025

IAM Project Manager / Cybersecurity Engineer

Fnac Darty

Delivered MFA coverage for 5,000+ identities, migrated 250+ users across 3 countries, and designed privilege elevation policies for 15+ applications.

How I work

From architecture to delivery.

I connect identity protocols, enterprise constraints, and delivery artifacts so security decisions can move from architecture to implementation.

IAM architecture and advisory

Identity strategy, architecture framing, target-state design, and decision support for identity-centric security programs.

Authentication and federation design

Practical design of SSO, MFA, OAuth2, OIDC, PKCE, mTLS, token validation, and API gateway integration patterns.

Access control and RBAC model design

Role model design, permission mapping, access governance flows, and review patterns that remain maintainable.

Identity lifecycle and onboarding flow design

Specification of joiner, mover, leaver, onboarding, password lifecycle, logout, and identity data synchronization flows.

IAM maturity assessments

Assessment of authentication, access governance, privileged access, identity data quality, monitoring, and delivery practices.

Technical documentation and solution design

Clear architecture documentation, API constraints, data models, decision records, and delivery-ready security specifications.

Latest writing

Technical writing built for depth.

The blog is designed for technical articles, architecture notes, and documentation-style case writeups.

3 min readDraft

Designing resilient MFA flows in enterprise environments

A practical draft on MFA rollout architecture, adoption risk, fallback paths, identity grouping, and measurable delivery.

MFAIAMEntra IDEnterprise Delivery
Read article
2 min readDraft

RBAC vs ABAC in real-world IAM programs

A practical draft on when role-based access control works, when attributes help, and why maintainability matters more than purity.

RBACABACAccess GovernanceIAM
Read article
2 min readDraft

Token design in modern IAM systems: claims, enrichment, and minimization

A technical draft on token structure, claim minimization, enrichment logic, API gateway constraints, and validation responsibilities.

OAuth2OIDCToken DesignAPI Security
Read article

Need identity engineering that can be explained clearly and delivered responsibly?

I am open to US opportunities, consulting, freelance missions, and collaboration around IAM, authentication, access governance, and security architecture.