Software, Network, and Security Architect: hacker mindset applied to real engineering.

While others discovered computers through games, I did so with a BASIC manual and a broken joystick.

Blue abstract network of connected nodes and lines
Close-up of backlit gaming laptop keyboard with green accents and red TrackPoint
Hands typing on keyboard under warm desk lamp

I have spent my career building, breaking, and fixing systems where software, networks, and security collide.

Today, I help organizations look beneath the surface of their infrastructure to make critical decisions where the margin for error is non-existent.

I work best when…

Your infrastructure suffers from “technical debt”

You’ve inherited a maze of servers and temporary patches that have become the company standard.

Security is a bottleneck

You need enterprise-grade protection that allows you to work with agility rather than blocking internal processes.

Growth meets complexity

You have ambitious data projects, but you need a solid architecture that won’t collapse when traffic volume increases.

About

My history with technology and security

My training did not begin at university, but rather at Christmas 1986.

Person typing on vintage CRT computer with green-on-black terminal interface
What I do

I step in when the diagram on the slide and the actual system no longer match, and no one knows what broke first.

Security and Ethical Hacking: architecture audits, pentesting that goes beyond automated tools, and forensic or incident support when something goes wrong.

Network Architecture and Infrastructure: mapping what you really have (not just what the documents say), evolving ISP/Telco environments, and reducing complexity for teams under pressure.

Software, Data, and Digital Business: I transform vague requirements into stable data flows and APIs, helping teams say “no” to unnecessary complexity.

Dark laptop with glowing Cyrillic keyboard overlay

Experience & selected cases

Proven experience in ISPs, operators, and public administrations.

ISP Launch and Security: I designed and tested the infrastructure of one of Spain’s first ISPs from scratch.

Crisis Recovery: I investigated a massive breach in a data center where a single server compromised more than 1,000 machines; I successfully rebuilt the trusted network.

High-Risk Protection: I shielded the digital environment of individuals in sensitive legal cases, providing technical evidence for the authorities.

Physical-Digital Integration: I developed biometric security for large venues where hardware, software, and the law must fit together perfectly.

Security: comprehensive ethical hacking, forensics, and ethical reporting.

Telecommunications: ISP-level routing and firewall management.

Architecture: distributed systems designed to last longer than one release cycle.

Governance: seamless management of ITIL, PMI, and Agile frameworks to ensure technical projects meet business objectives.

Skills & Methodology

Experience speaking the language of the terminal and the boardroom.