A SIEM-focused Cybersecurity Engineer with experience across Splunk, Azure Sentinel, and modern log management tools like Cribl. Skilled at working across on-prem and cloud environments, with hands-on knowledge of Azure, Linux, Proxmox, and containerization. Passionate about automation, scripting, and operational efficiency — with growing experience in Python, Ansible, and Go. Someone who combines real-world incident handling with homelab tinkering, contributing to production systems and building personal projects alike.
Sep 2022 - Present
Brussels, Belgium
Orange Cyberdefense is the expert cybersecurity business unit of the Orange Group, providing managed security, managed threat detection & response services to organizations globally.
Sep 2022 - Present
May 2019 - Aug 2022
Merelbeke, Belgium
Provide support for customers in ICT, HR and software projects
May 2019 - Aug 2022
May 2019 - Jul 2020
Belgium
At ICT Talents, we combine a passion for IT with comprehensive HR services for consultants, freelancers, and clients.
May 2019 - Jul 2020
2013-2014 IT Network Technician | ||
2007-2010 IT management |
Homelab environment for project testing
Setting up demonstration to use in interview for SOC analyst role
Complete project from buying domain, configuring DNS, creating mailbox, using Github combined with Netlify. A more attractive website showcasing my work.
Creating interactive instances to learn how to set up Splunk environments.
Multiple courses, learning Python in a self-paced gamified learning platform which covers topics like scripting, object oriented programming (OOP), functional programming.
To add more value at work and help out our senior techleads finetune our service, I decided to dive into CI/CD and Git. I genuinly enjoyed this course a lot about version control and unit testing.
A new service to support, so time to get some hands-on practice! A Microsoft learning module to explain Azure Sentinel helped me navigating the tool to investigate incidents. Also documented my findings inhouse for future reference for my colleagues and myself.
While Redteaming can be exciting (depending on the scope), I always had a preference for blueteaming, strengthening systems, learning and applying general cybersecurity concepts AND logs! Lots of logs!! I was a system engineer when I wanted to explore more about cybersecurity, following this course and setting up a Splunk SIEM at home was my first step.