Select the CV that best matches the role you are hiring for.
Each version highlights different aspects of my expertise — from security leadership and transformation, to enterprise architecture, IAM/PAM design, and risk governance.
Focuses on leadership, transformation, operating models, NIS2/ISO governance, and high-level architecture.
Ideal for:
• Interim/fractional CISO roles
• Security transformation lead
• Head of Security Engineering
• Program-level leadership
Highlights enterprise architecture, cloud governance, Zero Trust, AD/Entra security, PAM/IGA, and hybrid identity design.
Ideal for:
• Enterprise Security Architect
• Cloud Security Architect
• Zero Trust Architect
• Senior infrastructure security roles
Deeply focused on IAM/PAM architecture, AD/Entra tiering, PIM design, CyberArk/BeyondTrust frameworks, federation, JML, and identity governance.
Ideal for:
• IAM Architect
• PAM Architect
• Directory Services Architect
• Identity Governance roles
Focuses on enterprise risk management, ISO/NIST alignment, audit uplift, compliance programs, M&A assessments, vendor risk and governance.
Ideal for:
• Cybersecurity Risk Manager
• GRC Consultant
• Compliance & control roles
• Audit readiness projects