Independent Security Consultant

Clear findings.
Practical remediation.

ACyberSecure is built on experience across 300+ client security projects, including 125+ penetration testing engagements, cloud and M365 reviews, phishing work, and findings readouts for technical and executive stakeholders.

300+
Client Security Projects
125+
Pentest Engagements
4+
Years in Security Consulting
Tech + Exec
Findings Readouts
Scroll

Independent delivery backed by broad consulting experience

ACyberSecure is my independent consulting practice. I work across penetration testing, cloud and M365 reviews, gap assessments, phishing-related engagements, and security advisory, with experience built through 300+ client security projects and more than 125 penetration testing engagements.

I also bring experience briefing technical teams and executives, plus rebuilding reporting workflows and assessment tooling to make delivery cleaner, faster, and more consistent.

Direct engineer delivery

You work with the person doing the work—no sales handoff or account layers.

Practical scope

Penetration tests, cloud reviews, identity work, and advisory engagements are sized for real budgets, timelines, and team capacity.

Clear stakeholder communication

Reports and readouts are built to help engineers fix issues and help leadership understand risk, priority, and next steps.

Representative environments backed by hands-on delivery

These are examples of environments I have supported through team and consulting engagements. The work has included internal and external penetration tests, cloud and M365 reviews, gap assessments, phishing-related work, and findings readouts.

Standards & Methods NIST CSF CIS Controls
Global CX Operations
30k+ staff, 20+ countries

Supported security work for customer experience organizations at global scale.

Healthcare Payer Network
50M+ members

Supported engagements in regulated healthcare environments with strict privacy requirements.

Entertainment IP
$5B+ portfolio

Supported assessments for major content and IP portfolios.

Municipal Government
100k+ residents

Supported work for public-sector operations with compliance constraints.

Cold Chain Logistics
1B+ cu ft capacity

Supported reviews in temperature-sensitive logistics operations.

Public Utility
10M+ people served

Supported security work for essential services across multiple regions.

Figures are rounded for privacy and reflect environments supported across internal, consulting, and independent engagements.

Core services backed by hands-on consulting experience

These are the offers I focus on most: penetration testing, recurring validation, adversary simulation, gap assessments, cloud and identity reviews, and short-window implementation support.

Continuous Pentesting

Recurring test cycles, retest support, and release validation to catch regressions and keep pace with ongoing changes.

Request Scope

Red & Purple Teaming

Scoped adversary emulation and collaborative exercises to test detection and response, including phishing and social engineering scenarios when appropriate.

Request Scope

Gap Assessments (NIST/CIS)

Baseline your current state against NIST CSF or CIS Controls, then turn the gaps into a practical roadmap with technical and executive priorities.

Request Scope

Cloud & M365 Security Audits

Azure, M365, and identity-focused reviews covering IAM, Entra ID, MFA, logging, admin risk, and control validation across cloud environments.

Request Scope

Security Ops Support

Short-window support for Okta-to-Entra planning, licensing reviews, MFA and security configuration changes, endpoint security transitions, vulnerability triage, and related admin tasks.

Request Scope

What you get, and why it's credible

4+ years of hands-on security work across penetration testing, cloud/M365 reviews, and security support delivered through internal teams and consulting engagements. I’ve treated every year intentionally, investing heavily in continuous learning and practical execution to improve with every engagement.

Deliverables

  • Executive summary plus technical findings
  • Proof-of-concept steps and remediation guidance
  • Findings readout for technical and leadership stakeholders
  • Optional retest validation support

Sample report available on request.

Credentials

CCSP, eJPT, AZ-900, and SC-900 backed by repeated delivery across cloud, identity, and offensive security engagements.

CCSP eJPT AZ-900 SC-900

Hands-on delivery across cloud, identity, and offensive security engagements.

Selected public write-ups

Public vulnerability research and coordinated disclosure notes from work I identified and reported, with direct links when there is a public technical write-up worth reading.

CVE Vikunja

CVE-2026-40103

Scoped API token authorization mismatch in Vikunja. The public write-up documents the validated background-route case and remediation context.

Request Scope

If you need a pentest, cloud/M365 review, gap assessment, or short-window identity/security support, send a note with your environment, target scope, timing, and constraints. I'll follow up with next steps.

Typical response time: 1 business day.

Delivery

Remote-first, onsite by request

Availability

Flexible scheduling based on scope

Scope

Pentesting, cloud/M365, identity, advisory

Request Scope