1999 - 2003
University of Madrid - B.Sc. in
Telecommunications Engineering
Global Certifications in 23 years
Security Products Certifications in 23 years
Summary
Senior Security Engineer with 20+ years of hands-on experience designing and implementing security controls across cloud, on-prem, network, and ICS/OT environments. Expert in translating security standards (NIST, IEC 62443, etc.) into practical technical implementations. Specializes in building and automating secure infrastructures using Zero Trust, SASE, and micro-segmentation. Proficient in the full stack of security technologies, including cloud security platforms (CNAPP/CSPM), SIEM, EDR, firewalls, and identity management, with a strong focus on DevSecOps and automation.
Why do I change companies every three years?
Before COVID, many roles were fixed term engagements with a defined end date. After COVID, the market shifted strongly toward body leasing and body shopping contracts. In these engagements, the contract typically ends when the project or delivery phase ends.
Policies, Procedures & Awareness
Enterprise and Solution Architecture:
LeanIX EAM, ArchiMate, ADM , draw io, Miro, Whimsical, Graphviz, Jira, Azure DevOps Boards, Confluence, ServiceNow Secops, Log4brains, IBM DOORS, OpenControl, Compliance Masonry, AWS Audit Manager, Azure Policy, Open Policy Agent Rego, Auth0 Attack Protection playbooks, Varonis DatAdvantage maps, Purview data lineage, Syft, Grype, CycloneDX, SPDX, Dependency Track, Renovate, Dependabot, Archi plus ArchiMate, Structurizr C4 or PlantUML, IriusRisk, Jira plus Confluence with ADRs, Terraform plus Checkov plus OPA, Prowler or ScoutSuite, Syft plus Dependency Track, OpenTelemetry plus Grafana plus Loki, AWS Well Architected or Azure Advisor reviews
Threat modeling and attack simulation:
Microsoft Threat Modeling Tool, IriusRisk, OWASP Threat Dragon, securiCAD, PASTA, ThreatSpec, PyTM, MITRE ATT , Fence Tool EBIOS, FAIR, OCTAVE, MEHARI, MAGERIT, CWE Top 25, CAPEC
Perimeter IT Network Security and micro segmentation:
Guardicore, Claroty CTD and SRA, Armis, Vectra, Nozomi Networks, NanoLock, Verve Industrial, Microsoft Defender for IoT, Tenable OT, Prisma Cloud, RSA NetWitness, Imperva WAF, Fortinet, Juniper, Palo Alto Networks NGFW, DNS sinkholing, DNS behavior analysis, Microsoft Defender stack, Darktrace
Endpoint Security:
CrowdStrike, Carbon Black, Red Cloak, Microsoft Defender for Endpoint, Wazuh and ELK, THOR or Loki, HIPS or FIM Windows or Unix, sandboxing or detonation, recovery tooling, OllyDbg, IDA Pro
Database Security:
IBM Guardium, Imperva DB Firewall, Check Point CloudGuard, Trend Micro Cloud One
Identity & Access Management:
Okta, PingID, Microsoft Entra ID, Active Directory, Cisco ISE, TACACS, RADIUS, NAC, MFA, Conditional.
Logging & Forensics:
RSA enVision, Splunk Enterprise Security, Wazuh and ELK, Netwrix, Microsoft Defender XDR, Microsoft Sentinel, QRadar, Maltego, InsightIDR TI, Volatility, Autopsy, Helix, FTK, SANS SIFT
Threat Intelligence:
MISP, Maltego, SpiderFoot HX, BitSight, ZeroFox, SecurityScorecard, CyCognito, Faraday, Recorded Future, Insight TI, Censys, SpyCloud, data or API discovery
Data Leak Prevention:
Microsoft Purview DLP, GTB DLP, Forcepoint DLP, Netskope DLP, Fidelis DLP, Trellix DLP, Zscaler DLP, Symantec DLP, Mimecast DLP
Cloud Security:
Vulnerability Management:
Nozomi, Qualys, Nessus, Tenable, Rapid7, Greenbone, Retina, CoreImpact, Intune Defender ASR.
Secure Software Development and Application Security:
Black Duck, Veracode, Checkmarx, SonarQube, Burp Suite Pro, Invicti, Netsparker, Acunetix, Qualys Web App Scanning, Rapid7 AppSpider, Nmap, Nikto, Greenbone OpenVAS, Vega, Metasploit or Metasploit Pro, Core Impact, Invicti Enterprise, GitLab Secure, Jenkins Security Plugins, CircleCI pipelines with SAST, DAST, regression and smoke security testing. Microsoft Defender for DevOps, Aqua Trivy, Tenable Web App Scanning, Selenium, Postman, TestRail, Katalon, BrowserStack, container image scanning, dependency and license compliance checks, manual and automated penetration testing, continuous security gate enforcement across CI or CD.
1999 - 2003
University of Madrid - B.Sc. in
Telecommunications Engineering
Global Certifications in 23 years
Security Products Certifications in 23 years
Summary
Senior Security Engineer with 20+ years of hands-on experience designing and implementing security controls across cloud, on-prem, network, and ICS/OT environments. Expert in translating security standards (NIST, IEC 62443, etc.) into practical technical implementations. Specializes in building and automating secure infrastructures using Zero Trust, SASE, and micro-segmentation. Proficient in the full stack of security technologies, including cloud security platforms (CNAPP/CSPM), SIEM, EDR, firewalls, and identity management, with a strong focus on DevSecOps and automation.
Why do I change companies every three years?
Before COVID, many roles were fixed term engagements with a defined end date. After COVID, the market shifted strongly toward body leasing and body shopping contracts. In these engagements, the contract typically ends when the project or delivery phase ends.
Policies, Procedures & Awareness
Enterprise and Solution Architecture:
LeanIX EAM, ArchiMate, ADM , draw io, Miro, Whimsical, Graphviz, Jira, Azure DevOps Boards, Confluence, ServiceNow Secops, Log4brains, IBM DOORS, OpenControl, Compliance Masonry, AWS Audit Manager, Azure Policy, Open Policy Agent Rego, Auth0 Attack Protection playbooks, Varonis DatAdvantage maps, Purview data lineage, Syft, Grype, CycloneDX, SPDX, Dependency Track, Renovate, Dependabot, Archi plus ArchiMate, Structurizr C4 or PlantUML, IriusRisk, Jira plus Confluence with ADRs, Terraform plus Checkov plus OPA, Prowler or ScoutSuite, Syft plus Dependency Track, OpenTelemetry plus Grafana plus Loki, AWS Well Architected or Azure Advisor reviews
Threat modeling and attack simulation:
Microsoft Threat Modeling Tool, IriusRisk, OWASP Threat Dragon, securiCAD, PASTA, ThreatSpec, PyTM, MITRE ATT , Fence Tool EBIOS, FAIR, OCTAVE, MEHARI, MAGERIT, CWE Top 25, CAPEC
Perimeter IT Network Security and micro segmentation:
Guardicore, Claroty CTD and SRA, Armis, Vectra, Nozomi Networks, NanoLock, Verve Industrial, Microsoft Defender for IoT, Tenable OT, Prisma Cloud, RSA NetWitness, Imperva WAF, Fortinet, Juniper, Palo Alto Networks NGFW, DNS sinkholing, DNS behavior analysis, Microsoft Defender stack, Darktrace
Endpoint Security:
CrowdStrike, Carbon Black, Red Cloak, Microsoft Defender for Endpoint, Wazuh and ELK, THOR or Loki, HIPS or FIM Windows or Unix, sandboxing or detonation, recovery tooling, OllyDbg, IDA Pro
Database Security:
IBM Guardium, Imperva DB Firewall, Check Point CloudGuard, Trend Micro Cloud One
Identity & Access Management:
Okta, PingID, Microsoft Entra ID, Active Directory, Cisco ISE, TACACS, RADIUS, NAC, MFA, Conditional.
Logging & Forensics:
RSA enVision, Splunk Enterprise Security, Wazuh and ELK, Netwrix, Microsoft Defender XDR, Microsoft Sentinel, QRadar, Maltego, InsightIDR TI, Volatility, Autopsy, Helix, FTK, SANS SIFT
Threat Intelligence:
MISP, Maltego, SpiderFoot HX, BitSight, ZeroFox, SecurityScorecard, CyCognito, Faraday, Recorded Future, Insight TI, Censys, SpyCloud, data or API discovery
Data Leak Prevention:
Microsoft Purview DLP, GTB DLP, Forcepoint DLP, Netskope DLP, Fidelis DLP, Trellix DLP, Zscaler DLP, Symantec DLP, Mimecast DLP
Cloud Security:
Vulnerability Management:
Nozomi, Qualys, Nessus, Tenable, Rapid7, Greenbone, Retina, CoreImpact, Intune Defender ASR.
Secure Software Development and Application Security:
Black Duck, Veracode, Checkmarx, SonarQube, Burp Suite Pro, Invicti, Netsparker, Acunetix, Qualys Web App Scanning, Rapid7 AppSpider, Nmap, Nikto, Greenbone OpenVAS, Vega, Metasploit or Metasploit Pro, Core Impact, Invicti Enterprise, GitLab Secure, Jenkins Security Plugins, CircleCI pipelines with SAST, DAST, regression and smoke security testing. Microsoft Defender for DevOps, Aqua Trivy, Tenable Web App Scanning, Selenium, Postman, TestRail, Katalon, BrowserStack, container image scanning, dependency and license compliance checks, manual and automated penetration testing, continuous security gate enforcement across CI or CD.