Senior Infrastructure Engineer & Solutions Architect

Infrastructure failures in regulated environments are not abstract risks. I build systems where that does not happen.

Infrastructure failures in regulated environments are not abstract risks. I build systems where that does not happen.

8+ years delivering enterprise infrastructure in regulated financial environments — specialising in hybrid cloud architecture, operational resilience, and security engineering.

8+ years delivering enterprise infrastructure in regulated financial environments — specialising in hybrid cloud architecture, operational resilience, and security engineering.

Tablet mockup
Core Infrastructure Domains

Proven across regulated financial, multi-site, and hybrid enterprise environments

Proven across regulated financial, multi-site, and hybrid enterprise environments

Hybrid Infrastructure Architecture

Designing and delivering scalable hybrid environments that integrate on-premise infrastructure, cloud platforms, identity systems, and operational governance — including production deployments across three European locations in regulated banking.

technologies

Microsoft Azure • Windows Server • Linux (RHEL) • Entra ID • VMware • Hyper-V • Hybrid Identity

Operational Resilience Engineering

Enterprise Security Architecture

Infrastructure Modernization

Observability & Monitoring

Disaster Recovery & Business Continuity

INFRASTRUCTURE PHILOSOPHY

Infrastructure is not a cost centre — it is a strategic operational capability.

Infrastructure is not a cost centre — it is a strategic operational capability.

Modern enterprise infrastructure directly determines an organisation's ability to scale, recover from failure, maintain security under pressure, and meet evolving regulatory requirements. It is not a background function — it is a critical enabler of business continuity and operational resilience.

My approach is to design infrastructure ecosystems where reliability, security, observability, and automation are integrated from the foundation — not bolted on as afterthoughts. Every architectural decision should reduce operational complexity, absorb failure gracefully, and support long-term growth without requiring constant re-engineering.

The principle is straightforward: infrastructure should be resilient by design, secure by default, and scalable through standardisation. Whether modernising legacy platforms, architecting hybrid cloud environments, or strengthening disaster recovery posture, the objective remains the same — enterprise systems that perform reliably under real-world constraints, at scale, in regulated environments.

What I bring

Capabilities built in production, validated in regulated enterprise environments.

Capabilities built in production, validated in regulated enterprise environments.

Proven in Regulated Environments

Proven in Regulated Environments

+8 years delivering infrastructure in regulated environments — including PCI DSS, GDPR, PSD2, and SEPA compliance — means I design with regulatory constraints as a first-order requirement, not an afterthought.

Automation-Driven Operations

Automation-Driven Operations

I reduce operational overhead through scripted, repeatable infrastructure management — cutting manual workload by up to 30% in production environments through PowerShell and Terraform-based automation.

I reduce operational overhead through scripted, repeatable infrastructure management — cutting manual workload by up to 30% in production environments through PowerShell and Terraform-based automation.

Architecture That Absorbs Failure

Architecture That Absorbs Failure

I design for the assumption that components will fail. High-availability architectures, multi-site redundancy, and tested recovery strategies have sustained 99.99% uptime across mission-critical financial systems.

I design for the assumption that components will fail. High-availability architectures, multi-site redundancy, and tested recovery strategies have sustained 99.99% uptime across mission-critical financial systems.

Security Integrated, Not Added

Security Integrated, Not Added

Zero Trust principles, PKI, network segmentation, and identity governance are built into my infrastructure designs from the ground up — not retrofitted after deployment.

Zero Trust principles, PKI, network segmentation, and identity governance are built into my infrastructure designs from the ground up — not retrofitted after deployment.

KEY PROJECTS

Production deployments delivered in live enterprise environments across regulated financial services and multi-site infrastructure operations.

Production deployments delivered in live enterprise environments across regulated financial services and multi-site infrastructure operations.

2024 – 2025

SEPA Instant Payment Infrastructure:
High-Availability Financial System Architecture.

Production Deployment Eurobank, Luxembourg

Overview

Led the design and deployment of a high-availability IT infrastructure to support SEPA Instant Payments in a regulated banking environment, enabling real-time financial transaction processing under PCI DSS and PSD2 compliance requirements.

Challenge

SEPA Instant Payments demand sub-second transaction processing with zero tolerance for downtime. The architecture needed to eliminate single points of failure, ensure secure integration with both internal core banking systems and external payment gateways, and meet strict regulatory standards — all within a live banking environment.

Architecture & Delivery

Designed a load-balanced, multi-backend architecture distributing traffic across Windows Server and Red Hat Enterprise Linux (RHEL) nodes, ensuring continuous availability and fault tolerance. Implemented secure API integration enabling seamless real-time communication between internal banking platforms and external payment gateways. Deployed a Web Application Firewall (WAF) to protect externally exposed services against threats and enforce regulatory compliance requirements. Coordinated delivery across cross-functional teams spanning application, security, and infrastructure to ensure consistent integration and operational reliability from day one.

Outcomes

  • 99.99% uptime achieved for critical payment processing services

  • Full PCI DSS and PSD2 compliance validated at deployment

  • Zero single points of failure across the payment infrastructure

  • Seamless real-time transaction processing enabled at go-live

Key Focus Areas

High Availability Architecture • Load Balancing • Secure API • Integration WAF & Security Controls • PCI DSS & PSD2 Compliance • Cross-Platform Infrastructure • Windows Server • RHEL

2024 – 2025

Active Directory Multi-Forest Migration & Domain Consolidation:
Enterprise Identity Consolidation & Architecture Modernisation.

Production Deployment Eurobank, Luxembourg

Overview

Led the end-to-end consolidation of three Active Directory forests and six domains into a unified, secure identity architecture across a large-scale enterprise environment — delivering the project with zero downtime and full preservation of access permissions throughout.

Challenge

A fragmented multi-forest Active Directory environment created administrative complexity, governance gaps, and security risk across the organisation. Consolidating over 10,000 directory objects — including users, groups, and computer accounts — while maintaining uninterrupted access to all services required a precise, risk-controlled migration strategy with no tolerance for access disruption or data loss.

Architecture & Delivery

Designed and executed a structured migration strategy using ADMT and PowerShell automation, ensuring full preservation of SID history and access permissions across all migrated objects. Upgraded domain controllers to Windows Server 2022 and raised forest and domain functional levels, enabling modern authentication protocols (including Kerberos armoring and Protected Users security group support) and strengthening the overall identity security posture.

Reconfigured DNS, Group Policy Objects (GPOs), and inter-forest trust relationships to align with the consolidated architecture, ensuring environmental consistency and stability throughout the transition. Implemented PowerShell-based automation to streamline migration tasks and reduce manual operational overhead across the project lifecycle. Applied least privilege access principles and established regular auditing practices to strengthen identity governance and reduce residual risk in the consolidated environment.

Outcomes

  • 3 forests and 6 domains consolidated into a single unified architecture

  • 10,000+ directory objects migrated with zero access disruption

  • Full SID history and permission preservation validated post-migration

  • Domain controllers upgraded to Windows Server 2022 with raised functional levels

  • Zero downtime maintained throughout the entire project duration

  • Reduced administrative complexity and improved identity governance across the enterprise

Key Focus Areas

Active Directory Architecture • Multi-Forest Migration • ADMT • SID History Preservation • DNS & GPO Reconfiguration • Windows Server 2022 • Identity Governance • PowerShell Automation • Zero Trust Foundations • Business Continuity

2023 – 2025

DFS Infrastructure Implementation Across Multiple Geographical Sites:
Distributed File System Architecture for Multi-Site Enterprise Operations.

Production Deployment Eurobank, Luxembourg

Overview

Designed and implemented a Distributed File System (DFS) infrastructure across three geographical sites, replacing single-site storage dependencies with a resilient, high-availability file access and replication architecture serving a large-scale enterprise environment.

Challenge

A single-site storage model created availability risk, access latency across remote locations, and insufficient disaster recovery capability for critical file services. The organisation required a geographically distributed file infrastructure capable of ensuring consistent data access, synchronised replication across WAN links, and rapid recovery in the event of site failure — without disrupting ongoing operations during the transition.

Architecture & Delivery

Designed the DFS architecture around two core components: DFS Namespaces for transparent, location-independent file access, and DFS Replication for consistent data synchronisation across all three sites. Implemented bandwidth throttling and replication scheduling strategies to manage WAN link congestion and optimise cross-site latency without impacting business operations.

Led the migration of over 5TB of data to the new infrastructure with zero data loss and minimal service disruption, maintaining business continuity throughout the transition. Enforced access control through granular ACL configuration and quota management across more than 200 shared folders, ensuring secure and efficient file usage across the enterprise.

Contributed to disaster recovery design, reducing recovery time objectives (RTO) and establishing rapid restoration procedures for critical file services. Deployed proactive monitoring using Nagios and Zabbix to enable early detection of replication failures and performance degradation, sustaining 99.9% system availability across all sites. Collaborated with infrastructure and application teams to align the solution with operational requirements, and produced full documentation including rollback strategies to mitigate deployment risk.

Outcomes

  • DFS infrastructure operational across 3 geographical sites with seamless file access

  • 5TB+ of data migrated with zero data loss and minimal service disruption

  • 200+ shared folders secured with granular ACL and quota enforcement

  • WAN replication optimised through bandwidth throttling and scheduling

  • Reduced RTO for critical file services through improved DR architecture

  • 99.9% system availability maintained post-deployment

  • Full operational documentation and rollback procedures established

Key Focus Areas

DFS Namespaces & Replication • Multi-Site Infrastructure • WAN Optimisation • Access Control & Quota Management • Disaster Recovery Architecture • Data Migration • Nagios & Zabbix Monitoring • Business Continuity • Infrastructure Documentation

2023 – 2025

Implementation of an IT Monitoring & Observability Platform:
Centralised Monitoring for Performance, Availability, and Incident Response.

Production Deployment Eurobank, Luxembourg

Overview

Designed and implemented a centralised IT monitoring and observability platform across a multi-system enterprise environment, replacing fragmented visibility tools with a unified, real-time monitoring solution covering servers, networks, and applications.

Challenge

Operating a complex, multi-site infrastructure without centralised observability created blind spots in performance visibility, delayed incident detection, and extended mean time to resolution (MTTR) for critical services. The organisation needed a unified monitoring platform capable of providing real-time visibility across heterogeneous systems, generating actionable alerts, and supporting data-driven capacity planning — all aligned to business-critical service availability requirements.

Architecture & Delivery

Designed a multi-tool observability stack combining Zabbix for infrastructure and network monitoring, PRTG for device and bandwidth monitoring, and Grafana for unified dashboard visualisation and stakeholder reporting. Integrated infrastructure metrics, network performance data, and system health indicators into centralised dashboards, providing operations teams and stakeholders with a single, consistent view of environment health and behaviour.

Implemented a structured alerting framework with tiered severity thresholds, ensuring rapid escalation and response to critical incidents while minimising alert fatigue from low-priority notifications. Applied capacity planning and data-driven performance tuning based on monitoring insights, reducing operational risk and improving overall system reliability and resource utilisation.

Collaborated with infrastructure and network teams to map monitoring coverage against business-critical services, ensuring no gaps in visibility across the environment and aligning observability objectives with operational priorities.

Outcomes

  • Unified observability platform deployed across servers, networks, and applications

  • Measurable reduction in mean time to resolution (MTTR) for critical incidents

  • Centralised dashboards providing real-time visibility to operations and stakeholders

  • Structured alerting framework established with tiered severity thresholds

  • Improved capacity planning and resource utilisation through data-driven insights

  • Consistent monitoring coverage aligned to business-critical service availability

Key Focus Areas

Centralised Observability Architecture • Zabbix • PRTG • Grafana • Real-Time Monitoring • Alerting & Incident Response • Capacity Planning • Infrastructure Performance • Multi-Site Visibility • Operational Efficiency

2023 – 2025

Secure SFTP Infrastructure for Financial Data Exchange:
Compliant and Resilient File Transfer Platform for Regulated Banking Operations.

Production Deployment Eurobank, Luxembourg

Overview

Designed and implemented a hardened SFTP infrastructure to enable secure, compliant, and highly available transfer of sensitive banking documents across internal teams and external stakeholders, meeting full PCI DSS and GDPR regulatory requirements in a live financial environment.

Challenge

Transferring sensitive financial documents across internal and external parties in a regulated banking environment required a file transfer platform that could guarantee end-to-end encryption, centralised access governance, full auditability, and regulatory compliance — while maintaining consistent availability for over 100 users across operational and compliance-sensitive workflows.

Architecture & Delivery

Designed the platform around strong encryption standards — AES-256 for data at rest and SSL/TLS for data in transit — ensuring end-to-end protection of sensitive financial data throughout the transfer lifecycle. Integrated centralised access control with Active Directory, enabling role-based access governance, consistent identity management, and controlled onboarding of internal and external users across the platform.

Established comprehensive audit logging and automated monitoring mechanisms, enabling proactive detection of anomalies, failed transfers, and unauthorised access attempts while reducing manual operational intervention. Conducted vulnerability assessments and penetration testing to validate the security posture of the platform prior to production deployment, identifying and remediating residual risks before go-live.

Collaborated with infrastructure and security teams to align the platform architecture with enterprise security policies, operational workflows, and regulatory compliance requirements throughout the design and delivery phases.

Outcomes

  • Secure SFTP platform deployed supporting 100+ users across internal and external stakeholders

  • End-to-end encryption enforced using AES-256 and SSL/TLS across all transfer workflows

  • Full PCI DSS and GDPR compliance achieved and validated

  • 99.9% platform uptime maintained in production

  • Centralised audit logging established for full transfer traceability and regulatory reporting

  • Vulnerability assessment and penetration testing completed prior to go-live

Key Focus Areas

Secure File Transfer Architecture • AES-256 & SSL/TLS Encryption • Active Directory Access Control • PCI DSS & GDPR Compliance • Audit Logging & Monitoring • Vulnerability Assessment • Penetration Testing • Regulatory Compliance • High Availability

2023 – 2025

VMware Infrastructure Optimisation & High-Availability Virtualisation:
Enterprise Virtualisation Strategy, Consolidation & Operational Efficiency.

Production Deployment Eurobank, Luxembourg

Overview

Architected and deployed a comprehensive virtualisation strategy to optimise a large-scale VMware environment across multiple data centres, improving resource efficiency, operational performance, and disaster recovery capability while sustaining 99.99% uptime for critical workloads.

Challenge

A sprawling VMware environment of 300+ virtual machines across multiple data centres suffered from significant CPU and memory overprovisioning, slow VM provisioning processes, and insufficient high-availability and disaster recovery mechanisms for critical workloads. The organisation required a structured optimisation strategy that could consolidate and right-size the environment, introduce automation, and strengthen resilience — without disrupting ongoing operations.

Architecture & Delivery

Conducted a comprehensive audit and consolidation of over 300 virtual machines across multiple data centres, identifying and eliminating CPU and memory overprovisioning across the estate. Implemented right-sizing strategies that reduced overprovisioning by 30% while maintaining full system performance and stability across all workloads.

Deployed VMware HA and vSAN to establish high-availability and fault tolerance mechanisms across the virtualised environment, eliminating single points of failure for critical systems and sustaining 99.99% uptime. Introduced standardised VM templates and PowerShell and PowerCLI-based automation to streamline the provisioning lifecycle, reducing VM deployment time by 50% and significantly reducing manual operational overhead.

Strengthened disaster recovery posture through improved backup and replication strategies, reducing both recovery time objectives (RTO) and recovery point objectives (RPO) for critical systems. Hardened VM-level security configurations by aligning the environment with NIST and CIS benchmarks, reducing attack surface and improving the overall security posture of the virtualised infrastructure. Collaborated with infrastructure and operations teams throughout to ensure the virtualisation strategy remained aligned with business scalability requirements and long-term sustainability objectives.

Outcomes

  • 300+ virtual machines consolidated and optimised across multiple data centres

  • 30% reduction in CPU and memory overprovisioning achieved

  • 99.99% uptime sustained for critical workloads via VMware HA and vSAN

  • VM provisioning time reduced by 50% through standardised templates and automation

  • RTO and RPO improved for critical systems through enhanced backup and replication

  • VM security hardened and aligned with NIST and CIS benchmarks

  • Infrastructure scaled and right-sized for long-term business growth

Key Focus Areas

VMware vSphere Architecture • ESXi & vCenter • VMware HA & vSAN • VM Consolidation & Right-Sizing • PowerCLI Automation • Disaster Recovery & RTO/RPO Optimisation • NIST & CIS Benchmarking • Infrastructure Security Hardening • Capacity Planning • Multi-Datacentre Operations

Aug 2021 – Jan 2022

Windows Server Environment Upgrade & Modernisation:
Infrastructure Lifecycle Management — 2012R2/2016 to Windows Server 2019.

Production Deployment Anthogyr (Straumann Group), Luxembourg

Overview

Led the end-to-end upgrade and modernisation of a production Windows Server environment, transitioning from legacy 2012R2 and 2016 platforms to Windows Server 2019 — improving performance, security posture, and operational manageability while maintaining full business continuity throughout the project.

Challenge

A mixed legacy Windows Server environment running end-of-life and near-end-of-life platforms created growing security exposure, performance limitations, and increasing operational complexity. Transitioning mission-critical production workloads to Windows Server 2019 required a structured, risk-controlled approach that could accommodate complex application dependencies, preserve data integrity, and eliminate service disruption across the organisation.

Architecture & Delivery

Conducted a comprehensive pre-migration assessment covering existing hardware capacity, application dependencies, and workload requirements to define a structured, risk-controlled upgrade strategy. Designed and executed a phased migration plan that deliberately prioritised non-critical systems before transitioning mission-critical workloads — allowing validation at each phase before proceeding and minimising the blast radius of any unforeseen issues.

Applied a hybrid upgrade methodology combining in-place upgrades for suitable workloads and clean migration strategies for complex or dependency-sensitive systems, maintaining data integrity and system stability throughout. Enabled modern Windows Server 2019 security capabilities — including improved credential protection, enhanced auditing, and updated encryption standards — reducing the organisation's vulnerability exposure and aligning the environment with current compliance requirements.

Delivered measurable performance improvements through the upgrade, achieving up to 30% improvement in system responsiveness and resource utilisation across upgraded workloads. Introduced centralised management and automation capabilities post-upgrade, improving operational maintainability and reducing long-term administrative overhead.

Outcomes

  • Full Windows Server environment modernised from 2012R2/2016 to Server 2019

  • 99.9% uptime maintained with zero disruption to critical business operations

  • Up to 30% improvement in system responsiveness and resource utilisation

  • Security posture strengthened through modern Server 2019 security capabilities

  • Phased delivery approach validated at each stage before mission-critical migration

  • Centralised management and automation capabilities established post-upgrade

Key Focus Areas

Windows Server Lifecycle Management • Infrastructure Modernisation • Phased Migration Strategy • In-Place Upgrade & Clean Migration • Application Dependency Assessment • Security Hardening • Performance Optimisation Business Continuity • Risk-Controlled Delivery

Mar 2021 – Jul 2021

Hyper-V to VMware Infrastructure Migration:
Virtualisation Platform Transformation & Infrastructure Modernisation.

Production Deployment Anthogyr (Straumann Group), Luxembourg

Overview

Led the end-to-end migration of a production virtualised infrastructure from Hyper-V to VMware, transitioning over 100 virtual machines to a more scalable, performant, and operationally sustainable platform — delivered with zero data loss and 99.9% uptime maintained throughout.

Challenge

The organisation's existing Hyper-V environment had reached the limits of its scalability and operational flexibility, creating constraints on future infrastructure growth and increasing management complexity. Migrating 100+ production virtual machines — including mission-critical workloads — to VMware required a precise, risk-controlled strategy that could validate the approach incrementally, preserve data integrity across all systems, and maintain continuous availability throughout the transition.

Architecture & Delivery

Conducted a comprehensive pre-migration assessment of the existing Hyper-V environment, covering virtual machine configurations, storage architectures, network topologies, and application dependencies, to establish a complete migration inventory and identify risk areas before execution began.

Designed a phased migration plan that deliberately began with non-critical workloads, using pilot migrations to validate tooling, network reconfiguration, and VM conversion processes before committing mission-critical systems to the new platform. This incremental validation approach significantly reduced migration risk and provided confidence in the methodology ahead of each subsequent phase.

Successfully migrated over 100 virtual machines and associated applications to VMware with zero data loss and minimal operational impact, maintaining 99.9% uptime across the environment throughout the transition. Post-migration, the VMware platform delivered approximately 20% improvement in infrastructure performance alongside improved resource utilisation and simplified operational management.

Collaborated with infrastructure and application teams throughout to ensure business alignment at each migration phase, and delivered comprehensive documentation and knowledge transfer materials to ensure operational continuity and self-sufficiency for the team post-project.

Outcomes

  • 100+ virtual machines migrated from Hyper-V to VMware with zero data loss

  • 99.9% uptime maintained throughout the full migration lifecycle

  • Approximately 20% improvement in infrastructure performance post-migration

  • Phased, pilot-validated approach eliminated single-phase migration risk

  • Scalable VMware platform established to support future infrastructure growth

  • Full documentation and knowledge transfer completed for operational continuity

Key Focus Areas

Virtualisation Platform Migration • Hyper-V to VMware • VM Conversion & Migration Strategy • Phased Migration Methodology • Risk-Controlled Delivery • Infrastructure Performance Optimisation • Storage & Network Reconfiguration • Business Continuity • Knowledge Transfer & Documentation

Mar 2021 – Jul 2021

Network Infrastructure Migration — HP to Cisco:
Network Transformation, Standardisation & Security Modernisation.

Production Deployment Anthogyr (Straumann Group), Luxembourg

Overview

Led the end-to-end transformation of a production network infrastructure, replacing legacy HP switches and routers with a standardised Cisco-based architecture across the organisation — delivering improved performance, enhanced security posture, and a scalable network foundation with zero service interruption throughout.

Challenge

An ageing HP network infrastructure was creating performance bottlenecks, security gaps, and operational management complexity that constrained the organisation's ability to scale and align with modern security standards. Replacing 20+ production network devices — including core infrastructure components — required a migration strategy that could eliminate service disruption, preserve existing VLAN configurations and traffic flows, and validate each phase before progressing to business-critical network segments.

Architecture & Delivery

Conducted a comprehensive assessment of the existing HP network environment, documenting device configurations, VLAN structures, routing topologies, and traffic patterns to build a complete migration inventory and identify interdependencies before execution began.

Designed a phased migration plan that deliberately began with non-critical network segments, progressively validating the Cisco architecture and operational stability before transitioning core infrastructure components. This incremental approach preserved business continuity at every stage and provided a controlled rollback position throughout the migration lifecycle.

Successfully replaced over 20 network devices — including switches and routers — with Cisco infrastructure, achieving approximately 25% improvement in network performance through reduced latency and increased throughput across the environment. Implemented advanced Cisco security features including enhanced access control lists (ACLs), port security, and network segmentation capabilities, aligning the network architecture with modern security and compliance standards.

Established a standardised Cisco-based network architecture that simplified operational management, improved configuration consistency, and created a scalable foundation for future infrastructure growth. Conducted end-to-end validation testing across all network segments post-migration to confirm system compatibility and operational stability before project closure.

Collaborated with infrastructure and operations teams throughout to ensure full alignment with business requirements at each migration phase.

Outcomes

  • 20+ network devices replaced with zero service interruption

  • 99.9% uptime maintained throughout the full migration lifecycle

  • Approximately 25% improvement in network performance through reduced latency and increased throughput

  • Security posture strengthened through Cisco ACLs, port security, and network segmentation

  • Standardised Cisco architecture established across the full network estate

  • End-to-end validation completed confirming full compatibility and operational stability

Key Focus Areas

Network Infrastructure Migration • Cisco Switching & Routing • VLAN Architecture & Reconfiguration • Phased Migration Methodology • Network Security Hardening • ACL & Port Security • Network Segmentation • Performance Optimisation • Risk-Controlled Delivery • Business Continuity

Feb 2020 – Feb 2021

Hybrid IT Infrastructure Deployment:
On-Premise & Azure Cloud Integration for Scalable Enterprise Operations.

Production Deployment Redpines Connect, France

Overview

Designed and deployed a hybrid IT infrastructure integrating on-premise Windows Server environments with Microsoft Azure, establishing a secure, scalable, and operationally flexible platform that unified identity, workload management, and cloud services across a single cohesive architecture.

Challenge

The organisation operated a purely on-premise infrastructure that lacked the scalability, flexibility, and cloud integration required to support evolving business demands. Extending the existing Windows Server environment into Azure required a hybrid architecture that could unify identity across both environments, ensure secure connectivity between on-premise and cloud workloads, and lay a sustainable foundation for progressive cloud adoption — without disrupting existing operational services during the transition.

Architecture & Delivery

Designed and implemented a hybrid identity architecture integrating on-premise Active Directory with Azure Active Directory (Entra ID), enabling seamless single sign-on (SSO), centralised access control, and consistent identity governance across both on-premise and cloud environments.

Configured and optimised core Azure services — including virtual machines, storage accounts, and virtual networking — to support hybrid workload requirements, ensuring high availability and reliable performance across the integrated environment. Established secure hybrid connectivity between on-premise infrastructure and Azure, enabling controlled workload migration, cloud bursting capability, and consistent security policy enforcement across both environments.

Implemented identity and access management (IAM) controls and cloud security measures aligned with Microsoft best practices, strengthening the organisation's security and compliance posture across the hybrid architecture. Collaborated with infrastructure teams throughout to ensure smooth integration, operational stability, and alignment with business requirements at each deployment phase.

Outcomes

  • Hybrid infrastructure operational across on-premise Windows Server and Microsoft Azure

  • Unified identity established through Active Directory and Entra ID integration

  • Seamless SSO and centralised access control delivered across both environments

  • Azure compute, storage, and networking configured and optimised for hybrid workloads

  • Secure hybrid connectivity established between on-premise and cloud environments

  • IAM controls and cloud security measures implemented and aligned to best practices

  • Scalable foundation established for progressive cloud adoption and workload migration

Key Focus Areas

Hybrid Cloud Architecture • Azure Integration • Active Directory & Entra ID • Hybrid Identity & SSO • Azure Virtual Machines & Storage • Azure Networking • IAM & Access Control • Cloud Security • Infrastructure Scalability • On-Premise to Cloud Migration

Jan 2018 – Aug 2019

Industrial IT Infrastructure Design — OT/IT Integration:
Operational Technology & IT Convergence for Industrial Environments.

Production Deployment ARTS Energy, France

Overview

Designed and implemented a scalable system and network infrastructure for an industrial environment, integrating operational technology (OT) and traditional IT systems into a unified, secure, and high-availability architecture capable of supporting real-time data processing, predictive analytics, and mission-critical industrial operations.

Challenge

Industrial environments present a fundamentally different infrastructure challenge to enterprise IT — OT systems operate on deterministic, latency-sensitive protocols with high availability requirements, while traditional IT systems prioritise flexibility and connectivity. Bridging these two domains required a unified architecture that could enable seamless OT/IT communication, protect critical industrial systems from cyber threats, integrate IoT and analytics platforms, and sustain 99.99% uptime under real-world industrial operating conditions.

Architecture & Delivery

Designed a modular infrastructure architecture combining high-performance servers, industrial-grade storage systems, and ruggedised networking devices capable of supporting real-time data processing and latency-sensitive industrial applications. Developed a unified network architecture enabling seamless, low-latency communication between OT systems — including PLCs, SCADA platforms, and industrial controllers — and traditional IT infrastructure, improving operational efficiency and system interoperability across the environment.

Implemented a layered security architecture specifically designed for OT/IT convergence environments, incorporating network segmentation to isolate OT systems from general IT traffic, perimeter firewalls, and intrusion detection mechanisms to protect critical industrial infrastructure against both external threats and lateral movement risk. Security controls were aligned with industrial standards appropriate to the operational environment.

Integrated IoT devices and real-time data platforms to enable predictive maintenance capabilities and operational analytics, supporting data-driven decision-making across industrial operations. Validated system performance and resilience through comprehensive stress testing and failover simulations prior to production deployment, confirming 99.99% uptime capability and high-availability behaviour under failure conditions.

Outcomes

  • Unified OT/IT infrastructure architecture designed and deployed in a production industrial environment

  • Seamless communication established between OT and IT systems across the environment

  • Layered security architecture implemented including segmentation, firewalls, and intrusion detection

  • IoT integration and real-time analytics platform enabled predictive maintenance capability

  • 99.99% uptime validated through stress testing and failover simulation

  • Scalable, future-ready infrastructure established to support industrial growth and evolving operational requirements

Key Focus Areas

OT/IT Convergence Architecture • Industrial Network Design • SCADA & PLC Integration • IoT Integration • Real-Time Data Processing • Predictive Maintenance • Network Segmentation • Industrial Security • Intrusion Detection • High Availability • Stress Testing & Failover Validation

Selected Architecture Case Studies

Latest case studies

Latest case studies

Open to discussing infrastructure architecture, cloud transformation, or high-availability system design.

Whether the objective is infrastructure modernization, operational resilience, hybrid cloud transformation, or enterprise security architecture, I am always interested in discussing complex infrastructure environments and strategic technical initiatives.

Open to discussing infrastructure architecture, cloud transformation, or high-availability system design.

Whether the objective is infrastructure modernization, operational resilience, hybrid cloud transformation, or enterprise security architecture, I am always interested in discussing complex infrastructure environments and strategic technical initiatives.

Open to discussing infrastructure architecture, cloud transformation, or high-availability system design.

Whether the objective is infrastructure modernization, operational resilience, hybrid cloud transformation, or enterprise security architecture, I am always interested in discussing complex infrastructure environments and strategic technical initiatives.

ENTERPRISE INFRASTRUCTURE ARCHITECTURE

My work focuses on ensuring service continuity, optimizing performance, and supporting large-scale infrastructure transformations across multi-site and hybrid environments.

ENTERPRISE INFRASTRUCTURE ARCHITECTURE

My work focuses on ensuring service continuity, optimizing performance, and supporting large-scale infrastructure transformations across multi-site and hybrid environments.

ENTERPRISE INFRASTRUCTURE ARCHITECTURE

My work focuses on ensuring service continuity, optimizing performance, and supporting large-scale infrastructure transformations across multi-site and hybrid environments.