
Computer Engineer specialized in Cybersecurity, currently working as a CISO with over 12 years of IT experience, including 4 years as Head of Information Security. Motivated, people-oriented, and challenge-driven, I consider cybersecurity as a strategic priority for every organization. Polyglot: fluent in English, French, Italian, Amharic, and Tigrinya.
Definition and Implementation of the Security Policy
• Design and implementation of the organization’s security policy.
• Project management: planning, monitoring, and steering of IT security projects.
• Continuous monitoring of technological and regulatory developments to anticipate risks and adapt strategies.
• Advisory support to the DPO in tasks related to compliance and data protection.
• Application of security standards and enforcement of the security policy.
• Security needs assessment for business projects, risk evaluation, and proposal of mitigation measures.
• Auditing and monitoring the enforcement of security rules to ensure effectiveness and compliance.
• Crisis management: activation and coordination of crisis cells in case of major security incidents.
• Establishment and management of security committees to coordinate efforts and promote best practices.
• Preparation of reports for top management to support decision-making in security matters.
Advisory and Support :
• Providing guidance to top management on cybersecurity, aligning strategies with business objectives.
• Ensuring regulatory compliance, including GDPR and CNIL requirements.
• Promoting security awareness and training programs across the organization to strengthen security culture.
Operations and Technology :
• Implementation of a Security Operations Center (SoC) for continuous monitoring and incident response.
• Team management: leadership and development of the security team’s skills.
• Security incident management: rapid and effective response to minimize impacts.
• Deployment and oversight of advanced security technologies (IDS/IPS, next-generation firewalls, SIEM, EDR, XDR,
bastion systems).
• Identity and Access Management (IAM) to control access to resources and sensitive data.
• Cloud security: securing Office 365 and other cloud services to protect data and applications.
• Definition of administration strategies to ensure secure and efficient IT system management.
ISO/IEC 27005:2022 – Risk Manager (LSTI, 2025)
President & Founder – AEEE Humanitarian Association