Skip to content
MB

Experience

A progression from security operations to identity architecture and domain leadership.

The common thread is practical identity-centric security: making access, authentication, governance, and delivery decisions work inside real organizations.

February 2026 - Present

Cybersecurity & IAM Domain Manager

Amaris Consulting

Brussels, Belgium

01

Scope

Leads the development and structuring of the cybersecurity and IAM domain inside the IS & Digital pole.

Business impact

Contributed to +50% domain and team growth while strengthening offerings, delivery assets, recruitment, and pre-sales positioning.

Selected work

  • Defined domain strategy, offerings, positioning, and go-to-market priorities.
  • Scaled the practice through recruitment, team structuring, training plans, certifications, and knowledge sharing.
  • Acted as SME for cybersecurity and IAM across engagements and internal initiatives.
  • Led pre-sales activities including scoping, solution design, client support, and value framing.
  • Built internal methodologies, accelerators, and awareness initiatives for technical and business teams.

Relevant technologies

IAM StrategySecurity ArchitecturePre-salesCapability BuildingDelivery Assets

October 2025 - Present

Technical Analyst / Cybersecurity & IAM Technical Analyst

Amaris Consulting / Confidential Banking Client

Brussels, Belgium

02

Scope

Designs and documents identity flows, integration patterns, and security specifications for B2B banking applications.

Business impact

Creates developer-ready specifications that align architects, engineering teams, and business stakeholders around secure IAM delivery.

Selected work

  • Defined end-to-end authentication and authorization flows for login, onboarding, password lifecycle, and logout.
  • Designed OIDC and OAuth2 flows with PKCE aligned to security best practices and application constraints.
  • Specified integration patterns between applications, Apigee API gateway, and the Identity Provider.
  • Worked on mTLS, token validation strategies, token structure, enrichment logic, and lean claims design.
  • Structured identity data flows between authoritative sources and IAM components.
  • Specified SIEM-ready logging and monitoring requirements and contributed to RBAC and access governance models.
  • Produced technical specifications covering APIs, data models, sequence flows, constraints, and delivery decisions.

Relevant technologies

OAuth2OIDCPKCEmTLSApigeeIdPRBACSIEMToken Design

September 2023 - September 2025

IAM Project Manager / Cybersecurity Engineer

Fnac Darty

Paris / International

03

Scope

Led IAM and security projects across MFA, SSO, privilege management, Active Directory rights, and secure collaboration.

Business impact

Delivered MFA coverage for 5,000+ identities, migrated 250+ users across 3 countries, and designed privilege elevation policies for 15+ applications.

Selected work

  • Managed legacy Active Directory migration including audits, stakeholder coordination, and decommissioning.
  • Launched a global RFP to replace legacy file sharing with a secure collaborative platform.
  • Rolled out MFA in retail stores using Entra ID group setup, integration plans, KPI tracking, and communication plans.
  • Developed PowerShell scripts for recurring AD audits, inactive account reporting, delegation, and access traceability.
  • Conducted bi-annual access rights reviews and aligned access policies with NIST, GDPR, ISO 27001, and Paris 2024 security requirements.
  • Promoted security by design and reduced shadow IT risks across identity-related initiatives.

Relevant technologies

Microsoft Entra IDMFASSOActive DirectoryPowerShellPrivilege ManagerNISTISO 27001GDPR

September 2022 - September 2023

Information Security Officer

Nature et Découvertes

Paris, France

04

Scope

Strengthened endpoint protection, awareness, network security policy, and incident response foundations.

Business impact

Launched the first phishing awareness campaign and extended endpoint detection coverage through research, PoC, budget framing, and solution pitching.

Selected work

  • Administered Microsoft Defender and Trend Micro tooling for endpoint protection and hardening.
  • Built a PoC and business case to extend EDR coverage to unsupported operating systems.
  • Created phishing awareness material and reduced click rate through targeted education.
  • Strengthened switch and network security policies, responded to incidents, and produced post-incident reporting.
  • Contributed to Active Directory and policy hardening activities.

Relevant technologies

Microsoft DefenderTrend MicroEDRPhishing AwarenessIncident ResponseActive Directory

Earlier experience

A hands-on base before IAM leadership.

IT TechnicianIT InternComputer Science Tutor at Université d'Artois

Education and proof points

ESGI / ANSSI / Cisco / TOEIC

ESGI

Master's degree in Cybersecurity, completed with honors

Coursework across malware analysis, reverse engineering, forensics, advanced cryptography, offensive security, Linux and network administration, infrastructure protection, Rust, smart card security, and IAM.

ESGI

Bachelor's degree in Cybersecurity, completed with honors

Security engineering foundation covering infrastructure, systems, networking, and applied cybersecurity practice.

Cisco / CCNA-related backgroundANSSI certification / MOOCTOEIC 960/990