I work as a Security Engineer specializing in automation-driven, enterprise-scale Identity and Access Management (IAM). My focus spans Privileged Access Management (PAM), Identity Governance and Administration (IGA), Endpoint Privilege Management (EPM), and container secret management, where I design and operate identity controls end-to-end.

A core part of my work involves building automation pipelines using n8n to orchestrate IAM workflows, reduce manual overhead, and enforce consistent access governance across complex environments. In parallel, I integrate AI-driven security capabilities, leveraging large language models (LLMs) to improve decision accuracy, accelerate access evaluations, and optimize authorization processes in real time.

In the data security domain, I have hands-on experience with Data Access Management (DAM), Data Loss Prevention (DLP), SIEM operations, detection rule engineering, and sensitive data access governance. I also design AI-supported automation layers that strengthen data protection and compliance readiness.

Earlier in my career, I conducted offensive security assessments in regulated environments, aligned with financial regulatory standards. These engagements covered web and mobile applications, network infrastructures, and social engineering scenarios. This background strongly informs my approach to vulnerability management, threat modeling, and secure architecture design.


Core Skills

  • Identity & Access Management (PAM • IGA • EPM • Container Secret Management)
  • Automation Engineering (n8n workflows and orchestration)
  • AI-Driven Security & LLM-Integrated Processes
  • Data Security (DAM • DLP • Sensitive Data Governance)
  • SIEM Operations & Detection Engineering
  • Vulnerability Management & Penetration Testing
  • Regulatory Compliance & Security Architecture