Software, Network, and Security Architect: hacker mindset applied to real engineering.
While others discovered computers through games, I did so with a BASIC manual and a broken joystick.



I have spent my career building, breaking, and fixing systems where software, networks, and security collide.
Today, I help organizations look beneath the surface of their infrastructure to make critical decisions where the margin for error is non-existent.
Your infrastructure suffers from “technical debt”
You’ve inherited a maze of servers and temporary patches that have become the company standard.
Security is a bottleneck
You need enterprise-grade protection that allows you to work with agility rather than blocking internal processes.
Growth meets complexity
You have ambitious data projects, but you need a solid architecture that won’t collapse when traffic volume increases.
I step in when the diagram on the slide and the actual system no longer match, and no one knows what broke first.
Security and Ethical Hacking: architecture audits, pentesting that goes beyond automated tools, and forensic or incident support when something goes wrong.
Network Architecture and Infrastructure: mapping what you really have (not just what the documents say), evolving ISP/Telco environments, and reducing complexity for teams under pressure.
Software, Data, and Digital Business: I transform vague requirements into stable data flows and APIs, helping teams say “no” to unnecessary complexity.

Experience & selected cases
Proven experience in ISPs, operators, and public administrations.
ISP Launch and Security: I designed and tested the infrastructure of one of Spain’s first ISPs from scratch.
Crisis Recovery: I investigated a massive breach in a data center where a single server compromised more than 1,000 machines; I successfully rebuilt the trusted network.
High-Risk Protection: I shielded the digital environment of individuals in sensitive legal cases, providing technical evidence for the authorities.
Physical-Digital Integration: I developed biometric security for large venues where hardware, software, and the law must fit together perfectly.
Security: comprehensive ethical hacking, forensics, and ethical reporting.
Telecommunications: ISP-level routing and firewall management.
Architecture: distributed systems designed to last longer than one release cycle.
Governance: seamless management of ITIL, PMI, and Agile frameworks to ensure technical projects meet business objectives.

