Cybersecurity Expert & Ethical Hacker

I think like an attacker to defend you like a champion

Cybersecurity expert since 2011 with over 13 years of experience, I help companies identify and fix their vulnerabilities before real hackers exploit them. More than 200 companies have trusted me to secure their systems.

βœ“ Penetration Testing & Red Team Operations
βœ“ Security Audits & GDPR Compliance
βœ“ Incident Response & Digital Forensics

They Trusted us
See all our customers

How we work together:

3 simple steps to identify your security challenges and deploy a collaboration approach adapted to your business and technical reality.

πŸ”
Funnel Strategy

Mapping the whole decision process from consideration to loyalty.

πŸ”
CRO

Addressing all the components & material of your growth from acquisition to conversions.

πŸ”
Security Assessment

Together we conduct a comprehensive review to identify your IT assets and critical security points.

πŸ”
Scope Definition

We agree on a precise intervention scope and comprehensive action plan tailored to your budget and timeline.

πŸ”
Mission Execution

I start the mission with regular contact points and detailed reporting throughout the engagement.

The strategic advantages of an expert consultant without the drawbacks

Controlled and Flexible Costs

I define an intervention scope that matches your technical and financial reality, with the flexibility of an outsourced expert without long-term commitments.

Form API

High Level of Expertise

On-demand access to high-level expertise from a consultant who has proven themselves in critical environments over 13+ years.

Form API

Simplicity of Management

No need to anticipate recruitment or turnover in a tight market, nor manage career plans and their alignment with company objectives. Get expert security guidance when you need it.

Form API

My Areas of Expertise

Red Team Operations
Realistic attack simulations mimicking Advanced Persistent Threats to test your defenses comprehensively.
Security Audits
Deep and systematic evaluation of your IT security posture with actionable recommendations.
Penetration Testing
Reveal hidden weaknesses before real malicious hackers discover and exploit them.
SOC / SIEM Setup
Design and implementation of log ingestion and correlation systems for threat detection.
Incident Response
Your key response force for potentially threatening security incidents with forensic analysis.
Compliance & Certification
Show your clients and partners that no detail is left to chance when protecting your data.

Proven Track Record

13+ years of cybersecurity expertise with measurable results for clients across industries

"Iteria transformed our security posture completely. Their penetration testing revealed critical vulnerabilities we had missed, and their remediation guidance was invaluable. Highly recommended for any organization serious about cybersecurity."
Marc Dubois
CTO, TechStartup
"Working with Iteria was a game-changer for our compliance efforts. They helped us achieve ISO 27001 certification while significantly improving our security infrastructure. Their expertise is unmatched."
Sophie Laurent
Security Director, FinTech Solutions
"The CISO-as-a-Service model from Iteria provided us with enterprise-level security expertise without the overhead. Their strategic guidance helped us build a robust security foundation."
Thomas Moreau
CEO, DigitalHealth