A fighter at heart since childhood, I’ve spent my life learning to lose so that I can better appreciate my victories.
Today, as an Information Security Engineer, I coordinate both operational and governance aspects, but above all I remain passionate about technology and discovery.
I only thrive in adversity, and Cyber offers me a permanent intellectual war that means I can’t rest on my laurels, so I have to learn and, above all, improve every day.
Protecting our data and our digital assets has become my mission.
‘Quand tu allais on revenait’ – IAM.
This band thrilled me throughout my teenage years and still does. This song, but wow.
It represents the humility you have to have when faced with someone better than you.
Especially in Cyber because every time you think you’re good, there’s always someone who’ll find a vulnerability you hadn’t foreseen, hence the title of the song.
‘Leur voix s’élèvent, je les entends ils veulent me couler.
Je monte la garde pour décocher des ukulélés.’
The voices are the alerts and signals that detect a cyber attack, and the response is to analyse, block and react with our teams, putting our defences in place.
Every day should be about learning and getting better, without getting a big head and bringing it all the way back, because as the song ‘Quand tu allais on revenait’ goes:
‘Je prône les vertus du profil bas, l’eau qui dort fais plus de dégâts
Qu’un chien qui aboie mais ne mord pas’
An Information Security Engineer is a professional specialising in the protection of an organisation’s information assets, whether digital or physical.
This role encompasses a wide range of responsibilities relating to risk management, compliance, and the implementation of security policies and procedures to ensure the protection of sensitive data.
Skills required:
– Expertise in risk assessment and compliance. Examples: DORA, ISO 27001, NIST CSF.
– Mastery of SIEM (Security Information and Event Management) tools to monitor cybersecurity-related events.
– Advanced analytical skills to solve complex problems.
– In-depth knowledge of network technologies and security protocols.
With 1 overall score and 7 thematic scores,
find out where your strengths lie and where you need to improve, in just 5 minutes.
Your results are strictly confidential and will only be shared at your request.
The best cyber advice, use cases and self-assessments to help you improve your cyber skills or to benefit from the services of an expert CISO on a timeshare basis. Directly to your inbox.
You can unsubscribe at any time.
Guaranteed spam-free.