Cybersecurity Services
I help organizations implement, validate, and strengthen security programs—combining governance, risk and compliance (GRC), management system standards, and hands-on security testing to reduce risk and support business growth.
- Audit-ready deliverables: evidence models, ownership mapping, and clear documentation
- Risk-based execution: prioritize what reduces exposure and supports business goals
- Pragmatic outcomes: less bureaucracy, more measurable security progress
Core services
Who I work with
Teams that need practical, measurable security outcomes—without unnecessary bureaucracy.
- Startups preparing for enterprise customers and due diligence
- Growing companies needing structure (policies, risk, controls) without bureaucracy
- Teams pursuing or maintaining ISO/IEC 27001 certification
- Organizations building AI governance with ISO/IEC 42001
- Technical teams that need pentesting with actionable fixes
Typical outcomes: clearer ownership, faster readiness, stronger stakeholder confidence.
-
ISO/IEC 27001 Implementation & Certification Readiness
Build an ISMS that’s audit-ready, lightweight, and sustainable—focused on clarity, ownership, and repeatable routines.
What you get
- Scope, context, and governance setup (roles, responsibilities, objectives)
- Risk assessment approach + risk treatment plan structure
- Policy and procedure pack (aligned to your environment)
- SoA alignment + control ownership mapping
- Evidence model: what to collect, who owns it, and update cadence
Typical outcomes: faster audit readiness, fewer evidence re-requests, reduced audit friction.
-
ISO/IEC 42001 AI Governance Implementation (AIMS)
Make AI governance operational: policies, records, and routines that hold up in real-world scrutiny—built to survive assessments, not just templates.
What you get
- AIMS scope and AI system inventory structure
- AI risk identification + treatment workflow (practical and repeatable)
- Governance roles, accountability, and decision routines
- Documentation pack: procedures, records, monitoring cadence
- Audit-readiness check: gaps, priorities, and improvement plan
Typical outcomes: clearer governance for AI initiatives, defensible risk decisions, stronger readiness for reviews.
-
GRC Advisory & Risk-Based Security Programs
Turn security into measurable governance: risk, controls, and evidence that scale across teams and stakeholders.
What you get
- Risk assessments (technical + business) and treatment planning
- Control design and rationalization (avoid “checkbox security”)
- Evidence mapping and traceability model (who/what/when)
- Executive-ready reporting: risks, decisions, and next steps
- Remediation management: issue tracking, prioritization, follow-up
Typical outcomes: less confusion, more execution; controls aligned to real risk; stronger stakeholder confidence.
-
Audit Support (Internal Audits, Mock Audits, Supplier/Client Assurance)
Get prepared before the auditor arrives—or strengthen your program after the audit. I focus on clarity, defensibility, and practical remediation.
What you get
- Audit planning: scope, criteria, and sampling approach
- Evidence review and control effectiveness checks
- Findings written clearly (defensible, risk-linked, actionable)
- Corrective action plans and closure verification
Typical outcomes: fewer surprises, faster remediation cycles, audits that drive real improvement.
-
PCI DSS-Focused Pentesting & Technical Validation
Security testing aligned to PCI DSS expectations—built to validate real exposure, strengthen controls, and produce audit-friendly deliverables that teams can actually remediate.
What you get
- PCI scoping support: CDE identification, segmentation assumptions, and testing boundaries
- External & internal testing (as in-scope): web apps, infrastructure, and common attack paths into the CDE
- Vulnerability validation with proof-of-impact when appropriate (to reduce false positives)
- Prioritized findings mapped to risk and PCI DSS objectives, with clear remediation guidance
- Retesting to confirm fixes and support closure for evidence packages
Typical outcomes: PCI-ready reports, clearer risk acceptance decisions, faster remediation cycles, and stronger evidence for assessments.
Engagement packages
QuickStart — “Security Baseline in 2 Weeks”
Best for teams that need structure fast.
- Rapid discovery + risk snapshot
- Top-priority control and documentation set
- Roadmap for ISO readiness or GRC maturity
ISO 27001 Readiness Sprint — “From Chaos to Audit Plan”
Best for companies aiming for certification.
- Scope + SoA alignment
- Evidence model + control ownership
- Pre-audit readiness review + action plan
ISO 42001 AIMS Foundations — “AI Governance that Works”
Best for teams building AI processes.
- AIMS scope + AI inventory approach
- AI risk workflow + governance routines
- Documentation pack + monitoring cadence
Pentest + Remediation Track — “Find, Fix, Verify”
Best for teams that want outcomes, not just findings.
- Scoped testing + prioritized report
- Fix guidance and retest window
- Optional evidence pack for audits
How I work
- Risk-based and pragmatic: I prioritize what reduces exposure and supports business goals.
- Documentation you can actually use: clean, structured, maintainable deliverables.
- Stakeholder-friendly: technical depth without losing executives.
- Continuous improvement mindset: evidence, metrics, and iteration—not one-off checklists.
Let’s talk
If you’re hiring or need support with ISO/IEC 27001 or ISO/IEC 42001 implementation, GRC, audit readiness, or pentesting, I can help you ship practical security improvements—fast and clearly documented. Message me—I reply quickly.
You can write in English or Spanish.