HomeAboutFullstack DevOpsCybersecuritySysAdmin AI & TrainingPortfolioContact
FREN

CYBER
SECURITY

Perimeter protection, intrusion detection, offensive pentesting and regulatory compliance. We secure your systems against the most sophisticated threats.

Network & Firewall

PERIMETER
PROTECTION

Enterprise-class network security appliances to protect every entry point of your infrastructure.

Fortinet

Next-generation FortiGate firewalls, integrated SD-WAN, FortiAnalyzer for log analysis and FortiSIEM for event correlation. NSE4/NSE7 certified.

FortiGateSD-WANFortiSIEMNGFW

Cisco

Cisco ISE network infrastructure, ASA/FTD, Meraki and DNA Center. Zero Trust network segmentation, NAC and end-to-end centralised monitoring.

ISEASA/FTDMerakiZero Trust

pfSense / OPNsense

Open-source firewalls for environments requiring maximum flexibility. IPsec/OpenVPN VPN, integrated Suricata IDS/IPS, CARP high availability.

VPNIDS/IPSHAOpen Source
Offensive

PENTESTING
& AUDIT

We attack your systems before real attackers do. Methodical penetration tests and actionable reports.

Kali Linux

The reference pentesting distribution. We use Burp Suite, Metasploit, Nmap, Wireshark and custom tools for exhaustive audits following the OWASP methodology.

Burp SuiteMetasploitNmapOWASP

Vulnerability Analysis

Automated scans with Nessus, OpenVAS and Qualys. CVE prioritisation by CVSS criticality, detailed reports and remediation plan with progress tracking.

NessusOpenVASCVSSRemediation

Red Team

Realistic attack simulations: targeted phishing, social engineering, application vulnerability exploitation and lateral movement. Full defence chain testing.

PhishingSocial Eng.Lateral MoveC2
Defensive

SIEM
& SOC

Real-time detection, event correlation and incident response. A security operations centre at your service.

SIEM

Deployment and configuration of Splunk, ELK Security, Wazuh or QRadar. Custom correlation rules, SOC dashboards and integration with your log sources.

SplunkWazuhELK SIEMQRadar

EDR / XDR

Endpoint detection and response solutions. CrowdStrike, SentinelOne or Microsoft Defender for Endpoint for complete visibility over workstations and servers.

CrowdStrikeSentinelOneDefenderThreat Intel

Compliance

GDPR, ISO 27001, SOC 2 and PCI-DSS guidance. Security policies, risk analysis, internal audits and certification preparation.

GDPRISO 27001SOC 2PCI-DSS
Physical infrastructure

NETWORK
CABLING

Design and deployment of high-performance, certified physical network infrastructures.

Copper cabling

Certified Cat6a/Cat7 installation, patch panels, Fluke certification. Star and mesh topologies for environments from 10 to 10,000 ports.

Cat6aCat7CertificationRacks

Fibre optics

Single-mode and multi-mode fibre pulling, splicing, patch cords and reflectometry testing. Datacenter interconnection and very high-speed backbone.

Single-modeMulti-modeSplicingOTDR

Enterprise WiFi

WiFi 6/6E deployment with centralised controllers. Site survey, coverage planning, 802.1X authentication and dynamic VLAN segmentation.

WiFi 6802.1XSite SurveyVLAN
Field achievement

REAL CASE
CGC — IS AUDIT

Problem

Information system never assessed. Unknown risks, unidentified vulnerabilities, zero visibility on the actual infrastructure exposure.

Intervention

Full IS audit: asset mapping, targeted penetration tests (Nmap, Nessus, OWASP), CVSS scoring and vulnerability report delivered to management with a prioritised remediation plan.

Result

Clear risk visibility, structured improvement plan, strengthened compliance.

Risks mappedAction plan deliveredCompliance improved
View all achievements

YOUR SECURITY
IS COMPROMISED?

Free security audit. We identify your vulnerabilities and propose a concrete remediation plan.

Security audit