Where the breach
would make headlines,
I'm the call.
Eighteen years of offensive security across banking, government, media, healthcare and critical infrastructure. Brazil to Europe. Federal-grade trust.
Pentester · Red Team · Open Banking · FAPI · LGPD · GDPR · PCI-DSS
Featured in major Brazilian and international outlets covering cybersecurity, financial fraud and digital investigations.
Where we were the focus
Pentester by craft.
Not by certificate.
I started in 2007. No hacking course — I watched my first bank get breached and realized the problem wasn't technical, it was about people.
Eighteen years on, the same obsession: find the door before the criminal does. I've operated inside Latin America's largest public bank, on Open Banking platforms, in private banking across Brazil, Portugal, Italy and Morocco, at the world's largest iGaming company and on Europe's payments backbone.
In parallel, I've supported the Federal Police and Civil Police on complex cyber casework, and spoken at the Florida Association of Private Investigators on phishing and web attack tradecraft.
The focus is the same wherever the engagement: where it hurts most, where the adversary is most sophisticated, where the margin for error is zero.
Eight sectors. One discipline.
Financial sector dominates the engagement count, but the craft is the same across every regulated, high-stakes environment. Where the data has consequence, I've operated.
Where I helped identify the gaps.
By contractual restriction, descriptions are intentionally generic. Specific vulnerabilities, exploited vectors and audit findings are never published — not here, not on LinkedIn, not on a CV. The list below covers only public contractual relationships.
Partial list · Active engagements are not listed publicly until contract end and disclosure embargo expires
When the room needs to understand the adversary.
Florida Association of Private Investigators
Talk on digital threats, cyber investigations and data protection. Focus on phishing, web attacks and forensic evidence chain applied to private investigation.
Federal Police & Civil Police
Technical support on high-complexity cyber cases — forensic analysis, attack attribution, vector identification and investigative phase support.
Standards that guide every engagement.
The tools I actually use.
Five bases. One operational time zone.
Thirty minutes. No SDR. No funnel.
You explain the scope. I explain if it fits. Direct conversation with the operator — not a salesperson.
Direct booking
30-minute slot. Video or voice. English, Portuguese, Spanish or Italian.
Can't see the calendar? Open in new tab.