We practice what we preach

Cookieless analytics, fully managed by ByteRon. No personal data collected, no invasive tracking. Ever.

Privacy Policy →

Available for work

Technology Consultant

Ronaldo

  • Real Solutions — I focus on fixing actual problems, not selling you the latest shiny tool
  • Straight Talk — No consultant-speak or inflated timelines - just honest communication about what needs doing
  • Technical Skills to Back It Up — I don't just tell you what needs doing - I have the expertise to actually implement it
  • Always Learning — Technology evolves constantly, so I spend time learning new approaches and staying current
  • Quality Work — I aim to get things right the first time because fixing mistakes later costs everyone time and money

What I'm about:

Making technology work for your business instead of against it. No buzzwords, no overselling - just practical solutions that solve real problems.

MSc Information Security

BSc Mathematics

CompTIA Security+

learn more about me

Contact Page

My Experience

Tech Stack

Non-exhaustive list of tools and technologies I've worked with across 6 categories.

Many SaaS providers & tools I use are not listed here.

Daily use
Past Experience
Operating Systems & Virtualization
Linux Linux
Windows Windows
Kali Linux Kali Linux
Networking & Infrastructure
pfSense pfSense
OPNsense OPNsense
Fortinet FortiGate
Security Tools
Wireshark Wireshark
Nmap Nmap
Metasploit Metasploit
Development & Scripting
Python Python
JavaScript JavaScript
TypeScript TypeScript
Cloud & Applications
AWS AWS
Azure Azure
Google Cloud GCP
Databases & Backup
MariaDB MariaDB
PostgreSQL PostgreSQL
SQLite SQLite
Network Infrastructure•Security Architecture•Linux & Windows Systems•Cloud Solutions•Firewalls & VPNs•Identity Management•Encryption & Cryptography•Problem Solving•Docker & Virtualization•Scripting & Automation•Compliance (GDPR, HIPAA, PCI-DSS)•Vulnerability Assessment•Disaster Recovery•Open Source Tools•Technical Training•System Integration•Backup & Recovery•Security Monitoring•Wireless Security•Web Technologies•Risk Assessment•Policy Development•Incident Response•
Network Infrastructure•Security Architecture•Linux & Windows Systems•Cloud Solutions•Firewalls & VPNs•Identity Management•Encryption & Cryptography•Problem Solving•Docker & Virtualization•Scripting & Automation•Compliance (GDPR, HIPAA, PCI-DSS)•Vulnerability Assessment•Disaster Recovery•Open Source Tools•Technical Training•System Integration•Backup & Recovery•Security Monitoring•Wireless Security•Web Technologies•Risk Assessment•Policy Development•Incident Response•
Byteron Logo

Values

How I actually work - no corporate mission statement nonsense, just the principles that guide how I approach every project.

  • Fix problems, don't just talk about them
  • Security designed in, not bolted on as an afterthought
  • Competence over credentials and buzzwords
  • Make decisions based on what's actually right

Brutal Honesty

I tell you what's actually broken and what's not worth fixing, even when it's not what you want to hear.

Competence

I actually understand the technology I'm working with, not just the sales pitches.

Independence

I recommend what's right for your situation, not what pays the highest commission.

Quality & Accountability

I take ownership of my work and fix problems when they come up, not make excuses.

Ready to Work Together?

  • No sales pitch guaranteed

  • I build what I recommend

  • Your problems solved

Free consultation - honest answers about your tech challenges

My Story

so far

UK Flag
2005-2006

Self-Taught WiFi Hacking @ 15

Independantly learned about WiFi Hacking.
Week 1: Was able to hack my home WiFi
Week 2: Was able to hack most WiFi networks.

Used Backtrack (Now Kali Linux), Aircrack-ng, Terminal, WiFi Harware for capture and injection, access points, clients, channels and others.

Learned about concepts such as: WPA/WPA2, WEP, Packet Capture, ARP spoofing, Injection, de-authentication, MAC addresses, Interfaces, BSSID, Auth Handshakes and many other IT, Networking and WiFi concepts.

Later, during my Masters I learned the fundamentals of these concepts in depth.

Read more
2011-2015

BSc in Physics Mathematics

Following my first year in Physics, I realized it wasn't the right fit for me. I then pursued and completed my Bachelor's degree in Mathematics.

UK Flag
UK Flag
2012-2017 and 2015-2017

Assitant Manager

Having worked the whole time I was studying (2012-2017), I received a promotion into a leadership position (2015-2017).

Responsible for a team of 30-50 staff members including recruitment, training, cash handling, complaint resolutions, service delivery and responsible for multiple premises.

Provided regular services for 2000-3000 customers over the span of 2.5h, on average 3 times per day.

Obtained Level 2 health and safety, food hygiene, fire safety training.

Check LinkedIn for more

Read more
2015-2018

MSc Information Security

Due to my promotion I was self-funding my Masters studies while working 30-40h per week.
Thesis on Post-Quantum Hash-Based Digital Signature Schemes.
Completed with Distinction and an average of 77%.

UK Flag
UK Flag
2018-2020

Cyber Security Consultant @ Deloitte UK

Part of cross-functional, multi-disciplinary team across Cyber Risk Services in Cyber Intelligence Centre (CIC).

Worked on internal and external clients across APAC, EMEA, NA regions. Organization sizes varied from 1-10000s employees. Industries included, shipping, services, software, commerce and many others.

Due to my very broad technical compentency, I worked on all service functions delivered by the CIC (SOC)

Service worked at: Identity Access Management - IAM, Priveledged Access Management - PAM, Cyber Threat Inteliegence - CTI, Data Loss Prevention - DLP, Security Information Event Management - SIEM, Vulerability Management and other SOC functions.

Read more
2020-2021

Cyber Security Consultant & Engineer @ Navaio BV

Moved from UK to NL. Part of multiple teams in Cyber Resilience, Identity and Access Management, Product and Business Development.

Worked on various internal and external projects with a wide range of responsibilities ranging from consulting to technical implementation as well as being one of the internal security administrators. Gradually became one of the technical leaders in the bussiness.

Working with on-prem, cloud and hybrid based solutions and environments with organizations of various sizes. Industries varied from healthcare, finance to retail.

Read more
NL Flag
NL Flag
2021-2023

Head of Innovations @ Navaio BV

Led the identification of business and technology opportunities, driving the development of capabilities that elevated the overall maturity of our organization.

My diverse role blended executive leadership and hands-on technical implementation to revolutionize our IT and security infrastructure.

Technical leader across various IT and security domains, I provided expert consultation to all teams, establishing myself as a trusted advisor in technology and security.

My passion for technology and security extends beyond the professional sphere, ingraining them in every aspect of my work.

Read more
2024-Present

Byteron Inception

After taking a step back from the Security & Technology industries due to growing frustration, I embarked on a career break that allowed me to reevaluate my personal and professional goals.

One of the conclusions was the inception of Byteron.

I hope to help clients understand the impact of their technical decisions, and help move the bussiness forward in a way that is both secure and functional.

Read more
NL Flag Globe

Why Byteron Logo

After years in the technology and security industry, I got fed up with the snake oil solutions, vendor bias, and fake expertise everywhere. Too many consultants are more interested in selling whatever pays the highest commission than actually solving your problems. The industry is full of people giving advice about technology they've never actually implemented.

As an independent consultant, I can tell you what actually needs fixing without worrying about sales quotas, vendor relationships, or corporate politics. More importantly, I can actually build and deploy the solutions I recommend.

My goal is to be the technical expert you can actually trust, not just another salesman peddling the flavor of the month. I'm here to solve your technical problems from start to finish, not sell you someone else's product and disappear.

No Vendor Lock-in

I recommend what actually works for your situation, not what pays the highest commission or keeps vendor partnerships happy.

Complete Solutions

From strategy to implementation - I don't just hand you a report and walk away. I build what I recommend.

Broad Technical Expertise

One consultant who understands everything from infrastructure to security - no need to coordinate multiple specialists.

True Independence

No corporate politics, sales targets, or vendor relationships affecting my recommendations - just honest technical advice.