1-on-1 mentorship for IT and security professionals who run, architect, or defend Microsoft stacks. Active Directory, Entra ID, Azure, and Microsoft 365 security at the level enterprises actually need.
Identity is the perimeter. The cloud is the platform. Productivity tools are where the data lives. We work all three, in the order that matches your environment and your goals.
Tier model and privileged access design. Kerberos and NTLM weaknesses. Common attack paths the way attackers actually walk them: Kerberoasting, AS-REP roasting, Pass-the-Hash, Golden Ticket, ACL abuse. Hybrid identity with Entra Connect. Conditional Access design that holds up to audit and to attack. PIM, risk policies, and identity protection.
Identity is the perimeterLanding zones and the Cloud Adoption Framework. Network segmentation with hub-spoke, NSGs, Azure Firewall, and Private Endpoints. RBAC at scale, custom roles, and PIM for Azure resources. Defender for Cloud across CSPM and CWPP. Microsoft Sentinel basics. Governance with Policy and Initiatives. Key Vault and secrets that don't end up in source control.
Architecture and governanceDefender XDR across endpoint, identity, email, and cloud apps. Purview for data classification, sensitivity labels, and DLP. Exchange Online hardening: anti-phishing, Safe Links, Safe Attachments. Teams and external collaboration without leaks. Compliance baselines and Secure Score. Advanced Hunting with KQL: writing queries that catch what alerts miss.
Where the data livesIf you inherited an environment or need a baseline before you go further, we can start with a structured audit: configuration review, gap analysis against a hardening reference, and a prioritized 90-day roadmap you can hand to your manager. Optional, scoped on the first call.
Optional starting pointNo pre-recorded videos. No generic curriculum. Every session targets a real problem in your environment, on your timeline.
Video sessions scheduled around your week. Every session targets a real problem in your environment, not a slide deck.
Work in your own tenant or in a dedicated sandbox. You leave each block with running, tested configurations you understand line by line.
Architecture review, hardening roadmap, audit findings. Documents you can use internally to defend a budget or a design decision.
Between sessions, ask questions, share findings, iterate on documents. No 24-hour silence when you hit something you didn't expect.
Fabien Soulis. Multicloud security architect, pentester, incident responder. 15+ years securing global enterprises across North America and Europe.
Microsoft Certified Azure Solutions Architect Expert. Years designing Conditional Access for tens of thousands of users, hardening hybrid Active Directory environments, and deploying the Defender suite at enterprise scale. CISSP. Sorbonne instructor teaching security architecture at Paris 1 Panthéon-Sorbonne.
Built a SaaS cybersecurity business with dozens of enterprise clients. Zero major incidents across 150K+ employee environments. I teach what I actually deploy.
Book a free 30-minute call. We'll figure out where you're at, what your environment needs, and whether mentorship is the right move for you right now.
Read the free book, or join the Discord to learn from peers walking the same path.
Discord is open to serious learners only. For experience sharing between professionals making the jump.