Numergy is a Cloud Com-puting provider (IaaS model). I was responsible of the security architecture of their offer. Despite that a lot of security products exist on the market, we tried to improve IDS, IPS by studying the taxonomy of attacks.
We have deployed IAM (OpenIAM, Evidian), SSO, PKI (Microsoft, EJBCA), ERP (OpenERP), Ob-ject storage, Encryption of data base, SIEM (RSA)… We have developed under the “agil” method a commercial offer around Open-Stack, the opportunity for me to play as scrum master.
On the R&D activity we worked on big data project that consist in detecting rare malicious events in a large amount of data. We have mounted collaboration with some universities to work on Bayesian network, machine learning and formal concept analysis.
In charge of the activities of the hardware and software laboratories of cryptography (20 persons, up to 50 persons), I managed the activity of the laboratory and gave training and courses in cryptography. The goal of this project was to create a national security agency for the United Arabic Emirates. Among the objectives, we had to transfer the knowledge regarding the construction of IP-VPNs, HSMs, a PKI and a national sym-metric algorithm and more generally a competence regarding the research in this field.
I was also in charge of establishing collaboration with French company (Thales, EADS…) and Thales has accommodates our trainees for 6 months.
Among the achievement, we proposed an alternative to PKI by proposing a certificatless system that is more scalable and efficient; several Engineers started a PhD in the cryptography field and several En-gineers found prestigious positions relative to this field.
I developed tricky tools to generate automatically VHDL codes of block ciphers with counter-measures.
A national symmetric cipher has been developed there. Few publications showed the success of this enterprise.
in the laboratory ATI. In charge of a development project in Java language in which I had to analyze and to conceive graph algorithms. This topic is related to FCA theory (formal concept analysis), fusion of information and prediction. Applications are military and allows to the hierarchy to get quickly an overview of the situation in the battlefield. This subject can be applied in cyber defense and many other applications as tracking video and decision help material. We have concretely built software that Thales has sold to different customers (project “Stars”).
(Le Plessis Robin-son, France). I worked for the project “Volvic”, which is military project for which the customer was UAE. I was in charge of the transfer knowledge in cryptography for the UAE. I was in charge of all cryptography designs, mechanisms and protocols for different appliances developed by CS. I worked on the architecture of different version of IP-vpn and HSM. I directed with the Professor Claude Carlet (Paris 8) the thesis of Rafael Fourquet. I also directed Master trainees from UAE.
in the laboratory of TAI (Colombes), or I was working on European projects (DISCREET) focused on the safety of Ad-hoc networks, and networks strong constraints. I was responsible for setting up efficient cryptographic
solutions that do not deteriorate the quality of service. I also worked on, IDS, security policies in in-formation systems. Reviewer IEEE, Discrete Math, and Journal in Computer Virology. Research As-sociate Laboratory of Virology in the military school ESAT Rennes.
algorithms, ensuring compliance with the recommendations DCSSI. Evaluation of the safety of certain software (MINICITA). Study Plan for upstream CELAR, C development, research, design of algorithms, and responsibility for trainees. 08/07/04-18/04/05, Engineer in cryptography and telecommunications ERCOM (Velizy). I did audit of information security, implementation of cryptographic primitives, I solved problem of infor-mation transmission by introduction of error-correcting codes, scientific programming in C language. Electronic warfare (reverse engineering), blind demodulation, reconstruction of convolutive codes, error correcting codes, reconstruction of scramblers.
Currently I work as the R&D manager and architect in cyber security for Assystem and I am the co-ordinator of the H2020 European project SCISSOR. I am in charge of developing a cyber security department for Assystem. I am involved in constructing identity based authentication systems (IBE) and attribute based encryption (ABE). I develop original security architectures for critical systems as SCADA or Smart-Grid. I construct security solution based on open sources software as IDS/IPS, SIEM products and high level and scalable tools to administrate the identities, authorizations, roles, profiles in a SI. Despite that our solution could work for standard SI, we aim to provide a compliancy with the Modbus, Bacnet, DNP3… standards meet in critical infrastructures. In this sense, we have achieved an industrial application firewall with redundancy, IDPS and VPN functionalities (Next-Gen-FW). To complete the standard industrial architectures we have built an adapted physical diode. We use to help companies in obtaining ISO27001 certification, we help them to build an SMSI and we perform the different risk analysis by using EBIOS or MEHARI standards. I belong to the security group dedicated to security of SCADA for integrators at ANSSI and recently, I started to work on Blockchains application for IoT security: I am involved Io4 of IRT-systemx. As integrator we deploy SIEM solutions (OSSIM, Prelude). The next step consists in developing our offer in audit and consultancy. I am involved in the recruitment and I manage now a team of 12 people in cybersecurity.