Cybersecurity AdvisoryParis / France / Global

See the attack.
Strengthen the defense.
Guide the decision.

I help exposed organizations connect Red Team thinking, Splunk detection and executable governance so cyber decisions become clearer, faster and easier to defend.

6+
years in critical environments
SOC / Splunk
incident response & detection
CISSP / ISO 27001
executable governance
Red Team / Recon / Investigation
operator@redteam-achraf:~# nmap -sV --script vuln critical-scope.local
[*] Launching stealth reconnaissance modules...
[*] Mapping exposed services and weak trust paths...
[+] Privileged path candidate isolated through red-chain analysis.
[*] Preparing exploitation notes and hardening guidance...
SSH banner fingerprint matched to legacy host
Privilege escalation vector under review
Firewall egress path tagged for remediation
Field credibility & enterprise experience
E.LeclercAirbusCISSPSplunk Certified
Positioning

Red Team, SOC, governance. One standard.

The same execution bar expressed across three fronts: adversary thinking, SOC visibility and governance that holds.

Offensive universe

Red Team / Offensive

Reconnaissance, attack-path analysis, investigation and defensive architecture designed against a real adversary.

  • Attack paths
  • PKI & IAM
  • WAF / EDR / PAM
Operational universe

SOC / Splunk / Logs

Visibility, correlation, detection and incident command for environments with high operational exposure.

  • Splunk ES
  • Detection engineering
  • VOC & CTI
Strategic universe

Governance / Process

Documentation, steering committees, CISSP-level governance and operating models that can actually be executed.

  • ISO 27001
  • CISSP
  • Process & architecture
Scope of work

Intervene where cyber risk gets concrete.

Every engagement is built around a visible outcome: detect better, decide faster, harden sooner.

Splunk ES / Detection Engineering / VOC

SOC, Splunk & detection

Use-case design, tuning, CTI enrichment and faster incident response for mature SOC teams.

Attack paths / PKI / Wallix

Red Team readiness & defensive architecture

Attack-path analysis, identity controls, segmentation and trust architecture to reduce exploitable surface.

CISSP / ISO 27001 / Process

Operational cyber governance

Documentation, steering and cyber decision-making aligned with business and regulatory constraints.

Achraf Hachimi portrait
Ingenieur en Cybersecurite | CISSP

A profile built for the field and the boardroom.

Profile

A more personal presence without losing the premium tension.

Your portrait is now part of the landing page to humanize the personal brand while keeping the contrast with the Red Team, SOC and governance universes.

SOC N3, Splunk ES, VOC, SentinelOne
PKI, PAM, WAF, IAM, Cisco ISE
Governance, committees, policies, DAT / DEX
Retail, defense, critical infrastructure
Certifications

Real badges to reinforce the credibility layer.

A dedicated certification section now uses the actual badge visuals to reinforce expertise without turning the page into a generic logo wall.

E.LeclercAirbus
CISSP
ISC2 / 2026

CISSP

The key badge supporting the governance, architecture and risk leadership narrative.

ISO 27001 Lead Implementer
PECB / 2023

ISO 27001 Lead Implementer

Strong proof point for security management systems, policy work and operating governance.

Splunk Enterprise Admin
Splunk / 2024

Splunk Enterprise Admin

Anchors the SOC, logging and SIEM operating credibility with a more concrete proof layer.

Splunk Power User
Splunk / 2024

Splunk Power User

Completes the telemetry, correlation and investigation story with a real operational angle.

Selected interventions

Interventions aligned with the three cyber universes.

The website narrative is grounded in a real track record across SOC, architecture, IAM, DLP, compliance and critical infrastructure.

E.Leclerc

SOC N3 & Splunk command

Advanced investigations, detection engineering, vulnerability operations and remediation steering in a critical environment.

7k+ endpoints / Splunk ES / VOC
Airbus

DLP & classified data protection

Forcepoint, Netskope and data control policies for high-sensitivity environments and constrained regulatory contexts.

147k users / DLP / compliance
E.Leclerc

PKI, IAM & trust architecture

Cross-forest PKI, YubiKey MFA, Cisco ISE, PAM and enterprise-scale access security architecture.

Enterprise PKI / MFA / AAA
Lead Magnet #01

The Ghost-Hunter workflow map

A bug bounty-oriented working resource with workflow preview, pipeline logic and live server-side email capture.

Ghost-Hunter / workflow map
Lead Magnet #02

CISSP Study Planner

An interactive prep planner with email persistence, weekly workload and tracking across all 8 domains.

CISSP / study planner
Lead Magnet

The Ghost-Hunter workflow map

A clear view of the Ghost-Hunter pipeline to move from raw HTTP traffic to actionable test hypotheses, then to properly tracked findings.

The resource hub now contains two complementary formats: the Ghost-Hunter workflow map and an interactive CISSP planner with email persistence.

Ingenieur en Cybersecurite | CISSP

Need to frame a priority cyber issue?

I can step in on detection, architecture, governance or remediation with expert-level, directly actionable input.