Entra ID · Intune · Defender XDR · Security Architecture · ISO/IEC 27001:2022
Designing secure Microsoft 365 environments through strategic Identity & Access Management, endpoint governance, and ISO-aligned security architecture — reducing exposure and enabling sustainable compliance at scale.

ABOUT ME
I'm an Information Security Architect focused on Microsoft 365 security. I specialise in Identity & Access Management, endpoint governance, and secure cloud design. My tools of choice are Intune, Defender XDR, and Entra ID.
I have hands-on experience with ISO/IEC 27001:2022. This covers risk management, internal audits, and regulatory alignment. I build governance structures and security baselines that support business goals.
I align security with business goals. Risk is managed, not avoided.
I work across teams to embed security best practices organisation-wide.
I stay current with emerging threats and adapt security strategies accordingly.
Delivering security programmes that improve visibility, reduce exposure, and support sustainable compliance.
PROFESSIONAL EXPERIENCE
Fiverr · Freelance
Microsoft Community · Freelance
Simtec Software & Services · Contract
Regency Casino Thessaloniki · Full-time
CBS LAN A.E. / Lancom Ltd · Contract
SingularLogic · Full-time
Professional Development · Career Break
Synapsecom Telecoms S.A. · Full-time
Coral A.E. · Full-time
Iliadis Paulos & Co · Full-time
Tsotyli Delicatessen · Self-employed
CERTIFICATIONS & CREDENTIALS
Click any badge to view details
All certifications are also published on Credly
Visit my Credly profile to verify credentials, view digital badges, and see the full up-to-date list of earned certifications.
Cato Networks

LetsDefend (now part of HackTheBox)

CyberWarfare Labs

Cisco

Cisco

Cisco

Fortinet

Fortinet


IBM SkillsBuild

Microsoft Learning

Reatcode Group

TCM Security

National and Kapodistrian University of Athens

TÜV NORD Hellas

National and Kapodistrian University of Athens

AttackIQ

TECHNICAL EXPERTISE
Specialized in Microsoft Security Ecosystem
CORE COMPETENCIES
COMMUNICATION
Native
Professional
FEATURED PROJECTS
Axess Infrastructure Deployment
Designed and deployed a production-grade Layer 3 network for a ski resort. The system supports distributed access control and parking automation across the entire site.
Deployment Highlights
Documentation
Pigadia – AXESS Network & Infrastructure Overview
High-level overview of the network. Covers gate cabinets, chairlift integration, ticket office, parking automation, and server connectivity.
Omada L3 Network Architecture – Pigadia Deployment
Layer 3 network design and VLAN segmentation. Includes core switching, ER706W-4G gateway, industrial PoE cabinets, and parking network. Built for traffic isolation and scalable access control.
Pigadia – Omada Network Architecture & Runbook
Full deployment runbook. Includes VLAN design, IP addressing, PoE cabinets, parking integration, firewall rules, and security hardening guidelines.
University Project – Mediterranean College
University project designing a secure Smart Office network. It simulates a Siemens-style CPS environment with IoT devices and enterprise IT. A Head Office and Branch Office are connected via IPsec VPN. Built in Cisco Packet Tracer with full security documentation.
Deployment Highlights
Documentation
University of Derby – CPS Smart Office Presentation
Project presentation covering the network design, VLAN segmentation, IPsec VPN, and before/after hardening analysis.
Our Network Topology
Visual topology showing HQ and Branch architecture, VLANs, IPsec tunnel, IoT devices, and server placement.
300+ Employees – Financial Sector
A 4-month GRC transformation for a 300+ employee financial organisation. The project covered risk identification, impact assessment, mitigation planning, and full policy framework redesign. All outputs were structured for regulatory compliance.
Deployment Highlights
Documentation
Anonymized Enterprise GRC Transformation Report
Anonymized 4-month GRC project for a financial services firm. Includes risk assessment, heat maps, control gaps, policy redesign, RACI model, and mitigation roadmap.
Regency Casino Thessaloniki
Led Project Butler at Regency Casino Thessaloniki. The goal was to improve Food & Beverage operations through better technology. The project was delivered on time and at 100% completion.
Deployment Highlights
ACADEMIC BACKGROUND
EDUCATION
European International University - Paris
Official
Advanced Professional Diploma in Cyber Security, Computer and Information Systems Security/Information Assurance
Sep 2025 – Present
Covers both technical and managerial aspects of cybersecurity. Key areas include risk management, infrastructure protection, and incident response.
Includes preparation for the BSI ISO 27001 Lead Auditor certification. Covers ethical hacking, penetration testing, and strategic security decision-making.
Mediterranean College
Advanced Professional Diploma in Cyber Security, Computer and Information Systems Security/Information Assurance
Sep 2025 – Present
Covers both technical and managerial aspects of cybersecurity. Key areas include risk management, infrastructure protection, and incident response.
Includes preparation for the BSI ISO 27001 Lead Auditor certification. Covers ethical hacking, penetration testing, and strategic security decision-making.
General High School
High School Diploma, Technological
2006 – 2009
KEY COURSES
European International University - Paris
Advanced Diploma Program
Advanced Security Protocols
Enterprise Security Management
Security: Attacks and Countermeasures
Securing Networks
Human and Legal Aspects of Cyber Security
Certification Preparation
BSI ISO 27001 Lead Auditor — Information Security Management Systems
COMMUNITY & MEMBERSHIP

Cloud Security Alliance
Feb 2026 - Present

ISC2
Feb 2026 - Present

CyberSecurity NonProfit (CSNP)
Feb 2026 - Present

Chartered Institute of Information Security
Feb 2026 - Present
CAUSES I CARE ABOUT
Speaking & Events
Sessions where I share knowledge on cybersecurity, Microsoft 365 security architecture, and compliance frameworks.
Free seminar as part of Edu Festival 2026 (140 Free Seminars). The talk explores how AI and GenAI are reshaping cybersecurity — both as attack accelerators (phishing, deepfakes) and defensive tools. Covers risk through the CIA Triad and the EU AI Act accountability framework.
Complete professional profile in PDF format
GET IN TOUCH
I'm always interested in discussing new opportunities, collaborations, or sharing insights about cybersecurity and IT infrastructure. Feel free to reach out through any of the channels below.