Guillaume Daleux
Founder at Koasec- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
-
fra Native or bilingual proficiency
-
Anglais Professional working proficiency
Topline Score
Bio
Mohamad El Hout, M.B.A., M.Eng., CISSP, ISSAP, Human
Guillaume is SECURITY’s jack of all trades. I’ve worked with Guillaume when I was consulting for Hitachi (back then, Above Security) and was immediately impressed by his technical skills. He was always helpful and mindful of best practices to resolve an incident, fix an issue, or improve a process. It didn’t take me long to realize that the whole team respects Guillaume and looks up to him as a technical leader. On the business side, he was clear and concise in translating technical needs to business terms for upper management, effectively advancing projects he was responsible for. I hope to work again with Guillaume in the future.
Mohammed Gadelrab
Guillaume was an effective member of our research team at Above Security. In our meetings, he often suggests interesting ideas and raises thorough critics that helped us to excel in our projects. Because of this critical thinking, his technical and personal qualifications I predict that he will have a distinguished career especially in penetration testing and IT security audit.
Mohamad El Hout, M.B.A., M.Eng., CISSP, ISSAP, Human
Guillaume is SECURITY’s jack of all trades. I’ve worked with Guillaume when I was consulting for Hitachi (back then, Above Security) and was immediately impressed by his technical skills. He was always helpful and mindful of best practices to resolve an incident, fix an issue, or improve a process. It didn’t take me long to realize that the whole team respects Guillaume and looks up to him as a technical leader. On the business side, he was clear and concise in translating technical needs to business terms for upper management, effectively advancing projects he was responsible for. I hope to work again with Guillaume in the future.
Mohammed Gadelrab
Guillaume was an effective member of our research team at Above Security. In our meetings, he often suggests interesting ideas and raises thorough critics that helped us to excel in our projects. Because of this critical thinking, his technical and personal qualifications I predict that he will have a distinguished career especially in penetration testing and IT security audit.
Mohamad El Hout, M.B.A., M.Eng., CISSP, ISSAP, Human
Guillaume is SECURITY’s jack of all trades. I’ve worked with Guillaume when I was consulting for Hitachi (back then, Above Security) and was immediately impressed by his technical skills. He was always helpful and mindful of best practices to resolve an incident, fix an issue, or improve a process. It didn’t take me long to realize that the whole team respects Guillaume and looks up to him as a technical leader. On the business side, he was clear and concise in translating technical needs to business terms for upper management, effectively advancing projects he was responsible for. I hope to work again with Guillaume in the future.
Mohammed Gadelrab
Guillaume was an effective member of our research team at Above Security. In our meetings, he often suggests interesting ideas and raises thorough critics that helped us to excel in our projects. Because of this critical thinking, his technical and personal qualifications I predict that he will have a distinguished career especially in penetration testing and IT security audit.
Mohamad El Hout, M.B.A., M.Eng., CISSP, ISSAP, Human
Guillaume is SECURITY’s jack of all trades. I’ve worked with Guillaume when I was consulting for Hitachi (back then, Above Security) and was immediately impressed by his technical skills. He was always helpful and mindful of best practices to resolve an incident, fix an issue, or improve a process. It didn’t take me long to realize that the whole team respects Guillaume and looks up to him as a technical leader. On the business side, he was clear and concise in translating technical needs to business terms for upper management, effectively advancing projects he was responsible for. I hope to work again with Guillaume in the future.
Mohammed Gadelrab
Guillaume was an effective member of our research team at Above Security. In our meetings, he often suggests interesting ideas and raises thorough critics that helped us to excel in our projects. Because of this critical thinking, his technical and personal qualifications I predict that he will have a distinguished career especially in penetration testing and IT security audit.
0
/5.0 / Based on 0 ratingsFilter reviews by:
Credentials
-
IBM Certified Associate Analyst - IBM QRadar SIEM V7.3.2
IBMSep, 2020- Sep, 2024 -
IBM QRadar SIEM V7.3.2 Fundamental Analysis
IBMSep, 2020- Sep, 2024 -
Certified Cloud Security Professional (CCSP)
(ISC)²Aug, 2019- Sep, 2024 -
Sourcefire Certified Sales Representative (SFCSR) v5.2
SourcefireApr, 2014- Sep, 2024 -
FireEye Junior Systems Engineer
FireEye, Inc.Jun, 2013- Sep, 2024 -
Sourcefire Certified Professional (SFCP) v5.1.1
SourcefireJan, 2013- Sep, 2024 -
Microsoft Certified: Security Operations Analyst Associate
MicrosoftOct, 2022- Sep, 2024 -
Microsoft Certified: Azure Security Engineer Associate
MicrosoftJan, 2021- Sep, 2024 -
Microsoft 365 Certified: Security Administrator Associate
MicrosoftFeb, 2023- Sep, 2024
Experience
-
Koasec
-
Canada
-
Computer and Network Security
-
1 - 100 Employee
-
Founder
-
Apr 2019 - Present
-
-
-
Desjardins
-
Canada
-
Banking
-
700 & Above Employee
-
Cloud Security architect
-
Apr 2019 - Dec 2020
-
-
-
Ubisoft
-
France
-
Computer Games
-
700 & Above Employee
-
Security architect
-
Sep 2018 - May 2019
-
-
-
Hitachi Systems Security Inc.
-
Canada
-
Information Technology & Services
-
1 - 100 Employee
-
Lead Security Architect
-
Mar 2016 - Sep 2018
-
-
Service design team leader
-
Sep 2014 - Mar 2016
-
-
Developpeur / Intégrateur en sécurité des systèmes d'information
-
May 2014 - Sep 2014
-
-
-
-
Intégrateur Sécurité des Systèmes d'Information
-
Oct 2012 - Apr 2014
-
-
-
Université de Rouen
-
France
-
Higher Education
-
700 & Above Employee
-
Enseignant vacataire cours d'administration système
-
Jan 2013 - Sep 2013
-
-
-
-
Consultant en sécurité informatique
-
May 2012 - Aug 2012
Consultant en sécurité informatique Audits de sécurité externes / internes (Tests d'intrusion) Audits de sécurité d'applications Web Consultant en sécurité informatique Audits de sécurité externes / internes (Tests d'intrusion) Audits de sécurité d'applications Web
-
-
-
Above Security
-
Information Services
-
1 - 100 Employee
-
Recherche et développement d'applications sécurisés
-
Mar 2011 - Apr 2012
Développement d’un outil de découverte d’actifs sur un réseau. Aide au développement d’un corrélateur d’évenements de sécurité (alertes IDS, syslog, actifs du réseau). Recherche et développement d'une sonde supportant les réseau gigabit Mise en place puis direction d’un projet d'un groupe de 7 élèves avec l’université de Rouen Recherche et développement d’un Système de prévention d’intrusion Participation à de nombreux groupes de réflexion sur des produits de sécurité Développement d’un outil de découverte d’actifs sur un réseau. Aide au développement d’un corrélateur d’évenements de sécurité (alertes IDS, syslog, actifs du réseau). Recherche et développement d'une sonde supportant les réseau gigabit Mise en place puis direction d’un projet d'un groupe de 7 élèves avec l’université de Rouen Recherche et développement d’un Système de prévention d’intrusion Participation à de nombreux groupes de réflexion sur des produits de sécurité
-
-
-
-
Etudiant en master Sécurité des systèmes d'information
-
2006 - 2011
-
-
-
-
Stagiaire niveau licence
-
Jun 2009 - Aug 2009
- Administration et gestion du réseau (application et modifications de la stratégie de sauvegardes, sécurité et maintenance) - Mise en place d'une accession au réseau à distance. - Audit et modification de l'intranet, suppression des failles de sécurités. - Modifications (débogage) apportées sur de nombreuses applications locales en php / MySQL. - Rédaction d'un rapport de stage disponible sur demande. - Administration et gestion du réseau (application et modifications de la stratégie de sauvegardes, sécurité et maintenance) - Mise en place d'une accession au réseau à distance. - Audit et modification de l'intranet, suppression des failles de sécurités. - Modifications (débogage) apportées sur de nombreuses applications locales en php / MySQL. - Rédaction d'un rapport de stage disponible sur demande.
-
-
Education
-
Université de Rouen
Master, Sécurité des systèmes d'informations