Eddie GBAGUIDI

I'm Eddie GBAGUIDI, Network & Security Engineer

Passionate engineer who transforms technical challenges into concrete solutions. I lead infrastructure projects end-to-end: audit, design, deployment, and operations. My approach combines technical rigor with strategic vision to deliver high-performance, secure environments.

Beyond technology, I believe in collaborative leadership and knowledge sharing.

04+

Years Experience

15+

Projects Done

10+

Happy Clients

08

Certifications

Technologies & Tools Mastered

Specialized expertise across cloud infrastructure, cybersecurity and enterprise systems

Networking Logo

Networking

Cisco, VLAN/VRF

Networking Logo

Fortinet Security

FortiGate, VPN, UTM

Networking Logo

Cloud Azure

IaaS/PaaS, VNets, Azure AD, Migration

SOC/SIEM

Wazuh, ELK, FortiSIEM, Splunk

Active Directory

AD, Entra ID, GPO, Tiering Model

Linux Logo

Linux

Ubuntu, CentOS, Bash, Hardening

Automation

Python, PowerShell , Git

More...

NAC, PKI, Backup, Monitoring & Documentation

Want to see my complete technical stack and certifications?

View Certifications

My Services & Offerings

Clear, tailored infrastructure solutions designed for your needs.

Infrastructure Security Assessment

Identify Critical Vulnerabilities Before Threats Find Them

The Problem

You have firewalls, antivirus, and security policies. But do you actually know where your vulnerabilities are? Most organizations operate blind—they don't discover breaches until weeks or months after the damage.

What You Get

  • Comprehensive vulnerability scan (all devices, services, open ports)
  • Cloud & configuration review (Azure, on-premise architecture)
  • Detailed findings report with prioritized recommendations
  • 1-hour restitution call + 30-day follow-up support

The Outcome

  • Know exactly where your critical gaps are
  • Clear prioritization: what to fix first, what can wait
  • Realistic timeline that works for your business
Duration: 2-5 business days

Enterprise SIEM Deployment with Wazuh & ELK

Centralized Security Monitoring • Real-Time Threat Detection

The Reality

Right now, thousands of security events are happening on your infrastructure. Without centralized monitoring (SIEM), breaches aren't detected in hours—they're discovered weeks or months later.

What's Included

  • Complete Wazuh + ELK deployment (manager, agents, Elasticsearch, Kibana)
  • Custom security detection rules (mapped to MITRE ATT&CK)
  • Operational dashboards + automated alerting
  • Team training + 60 days post-deployment support

The Outcome

  • Infrastructure becomes visible—threats detected in minutes
  • Compliance audits become easy (full audit trail)
  • Your team can manage it long-term
Timeline: 2-4 weeks

Azure Cloud Security Assessment

Harden Your Tenant Before Misconfigurations Become Breaches

Common Azure Gaps

Public Storage Accounts, overly permissive NSGs, admin accounts without MFA, encryption not enabled, logs not retained. Most teams don't know these gaps exist until something goes wrong.

What You Get

  • Complete IAM & access review (over-privileged accounts, MFA gaps)
  • Network security analysis (NSGs, public exposure, segmentation)
  • Data protection audit (encryption, Key Vault, backup)
  • 1-hour restitution call + 30-day follow-up support

The Outcome

  • Understand your Azure Secure Score
  • Know what to fix first
  • Realistic timeline to harden your cloud infrastructure
Duration: 2-4 business days

SIEM Deployment Audit & Optimization

Get Maximum Value from Your Existing Monitoring

The Challenge

You deployed Wazuh or ELK. But is it actually working? Many organizations deploy monitoring but don't get the ROI they expected. Detection rules create noise instead of insight.

What You Get

  • Coverage assessment (which assets are monitored, which gaps exist)
  • Detection rule review (tuning, false positives, missed opportunities)
  • Dashboard evaluation + performance analysis
  • Actionable recommendations + 1-hour consultation

The Outcome

  • Know what's working and what's broken
  • Reduce noise, increase signal
  • Get actual ROI from your monitoring investment
Duration: 2-3 business days

Have a Specific Need?

Every infrastructure is unique. Let's discuss your challenges to define the ideal approach.

Contact Me

My Approach & Core Values

Building secure infrastructure isn't just about technology — it's about trust, clarity, and sustainable solutions.

Pragmatic Security

Solid solutions without unnecessary complexity. Security should be effective and operational, not paralyzing.

Reliability & Rigor

Tested, documented, and maintainable architectures. Every infrastructure is built to last.

Tech Curiosity

Continuous learning about cybersecurity, cloud, and emerging threats. Technology evolves, I stay current.

Knowledge Sharing

Clear documentation, continuous training. I believe in knowledge transfer and team skill development.

Collaborative Leadership

Coordinate, motivate, empower. As head of the RSS committee at Oozons, I lead and mentor a multidisciplinary technical team.

Methodical Crisis Management

Crisis management, responsiveness, and methodology. During incidents, I stay calm and follow response procedures.

Progress isn't optional. Either you evolve, or you slowly fade away. Those who win move twice as fast.

— Eddie GBAGUIDI