We practice what we preach
Cookieless analytics, fully managed by ByteRon. No personal data collected, no invasive tracking. Ever.
Privacy Policy →Available for work
What I'm about:
Making technology work for your business instead of against it. No buzzwords, no overselling - just practical solutions that solve real problems.
learn more about me
Contact Page
Non-exhaustive list of tools and technologies I've worked with across 6 categories.
Many SaaS providers & tools I use are not listed here.
Pi-hole
Active Directory
Syslog-ng
Wireshark
Nmap
Aircrack-NG
Suricata
CyberArk
OneIdentity
Omada
Portainer How I actually work - no corporate mission statement nonsense, just the principles that guide how I approach every project.
I tell you what's actually broken and what's not worth fixing, even when it's not what you want to hear.
I actually understand the technology I'm working with, not just the sales pitches.
I recommend what's right for your situation, not what pays the highest commission.
I take ownership of my work and fix problems when they come up, not make excuses.
so far
Independantly learned about WiFi Hacking.
Week 1: Was able to hack my home WiFi
Week 2: Was able to hack most WiFi networks.
Used Backtrack (Now Kali Linux), Aircrack-ng, Terminal, WiFi Harware for capture and injection, access points, clients, channels and others.
Learned about concepts such as: WPA/WPA2, WEP, Packet Capture, ARP spoofing, Injection, de-authentication, MAC addresses, Interfaces, BSSID, Auth Handshakes and many other IT, Networking and WiFi concepts.
Later, during my Masters I learned the fundamentals of these concepts in depth.
Read moreFollowing my first year in Physics, I realized it wasn't the right fit for me. I then pursued and completed my Bachelor's degree in Mathematics.
Having worked the whole time I was studying (2012-2017), I received a promotion into a leadership position (2015-2017).
Responsible for a team of 30-50 staff members including recruitment, training, cash handling, complaint resolutions, service delivery and responsible for multiple premises.
Provided regular services for 2000-3000 customers over the span of 2.5h, on average 3 times per day.
Obtained Level 2 health and safety, food hygiene, fire safety training.
Check LinkedIn for more
Read more
Due to my promotion I was self-funding my Masters studies while working 30-40h per
week.
Thesis on Post-Quantum Hash-Based Digital Signature Schemes.
Completed with Distinction and an average of 77%.
Part of cross-functional, multi-disciplinary team across Cyber Risk Services in Cyber Intelligence Centre (CIC).
Worked on internal and external clients across APAC, EMEA, NA regions. Organization sizes varied from 1-10000s employees. Industries included, shipping, services, software, commerce and many others.
Due to my very broad technical compentency, I worked on all service functions delivered by the CIC (SOC)
Service worked at: Identity Access Management - IAM, Priveledged Access Management - PAM, Cyber Threat Inteliegence - CTI, Data Loss Prevention - DLP, Security Information Event Management - SIEM, Vulerability Management and other SOC functions.
Read moreMoved from UK to NL. Part of multiple teams in Cyber Resilience, Identity and Access Management, Product and Business Development.
Worked on various internal and external projects with a wide range of responsibilities ranging from consulting to technical implementation as well as being one of the internal security administrators. Gradually became one of the technical leaders in the bussiness.
Working with on-prem, cloud and hybrid based solutions and environments with organizations of various sizes. Industries varied from healthcare, finance to retail.
Read moreLed the identification of business and technology opportunities, driving the development of capabilities that elevated the overall maturity of our organization.
My diverse role blended executive leadership and hands-on technical implementation to revolutionize our IT and security infrastructure.
Technical leader across various IT and security domains, I provided expert consultation to all teams, establishing myself as a trusted advisor in technology and security.
My passion for technology and security extends beyond the professional sphere, ingraining them in every aspect of my work.
Read moreAfter taking a step back from the Security & Technology industries due to growing frustration, I embarked on a career break that allowed me to reevaluate my personal and professional goals.
One of the conclusions was the inception of Byteron.
I hope to help clients understand the impact of their technical decisions, and help move the bussiness forward in a way that is both secure and functional.
Read more
After years in the technology and security industry, I got fed up with the snake oil solutions, vendor bias, and fake expertise everywhere. Too many consultants are more interested in selling whatever pays the highest commission than actually solving your problems. The industry is full of people giving advice about technology they've never actually implemented.
As an independent consultant, I can tell you what actually needs fixing without worrying about sales quotas, vendor relationships, or corporate politics. More importantly, I can actually build and deploy the solutions I recommend.
My goal is to be the technical expert you can actually trust, not just another salesman peddling the flavor of the month. I'm here to solve your technical problems from start to finish, not sell you someone else's product and disappear.
I recommend what actually works for your situation, not what pays the highest commission or keeps vendor partnerships happy.
From strategy to implementation - I don't just hand you a report and walk away. I build what I recommend.
One consultant who understands everything from infrastructure to security - no need to coordinate multiple specialists.
No corporate politics, sales targets, or vendor relationships affecting my recommendations - just honest technical advice.