Enzo LE NAIR
Cybersecurity Consultant · AI × Cyber Explorer
Let's talkAbout
Six years building and operating systems and networks gave me something most security consultants don't have: a ground-level understanding of how things really work before they break. That foundation is what shaped my approach to cybersecurity — not just defending perimeters, but understanding what's behind them. Today, I bridge operational security with emerging AI capabilities to build programs that are both resilient and forward-thinking.
6 years of infra expertise turned into a cybersecurity advantage.
LLMs, agentic workflows & automation applied to real security challenges.
BUILD & RUN mindset: from architecture design to day-to-day security operations.
Expertise
Deployment and management of EDR solutions at scale (+20k endpoints), including regulated and air-gapped environments. DevSecOps integration.
Proactive threat hunting, SIEM use case development, threat intelligence operationalization, and detection enhancement.
Cyber incident handling, root cause analysis, digital forensics investigations, and coordinated remediation.
Research and development of AI-powered security tools. Local LLM deployment, LangChain, HayStack, agentic workflows and automation at the intersection of AI and Cyber.
Infrastructure and configuration audits, security architecture design, compliance assessment, and GRC advisory (CISO assistance).
Experience
Education
Institut Informatique Appliquée (ESIEE-IT)
CNAM
UFA Saint Charles Sainte Croix
Lycée Touchard Washington
Projects
ReAct agentic AI that autonomously hunts ClickFix social-engineering infrastructure, extracts malicious payloads, and generates structured threat intelligence reports with IOCs & TTPs.
Multi-mode CTI tool combining FOFA search engine with AI-powered analysis. OSINT automation, C2 hunting, open directory scanning and geolocation enrichment.
Python tool for auditing and monitoring DNS-based email security mechanisms — SPF, DKIM, DMARC, BIMI and SSL/TLS validation.
Ready-to-run Linux security monitoring using Python + BCC and eBPF. Real-time syscall visibility for SOC and threat detection use cases.
Aggregates vulnerability data from ENISA, NIST and OpenCVE APIs to collect and track CVEs for specific CPEs. Automated reporting pipeline.
Cyberpunk-themed speech-to-text application with AI voice recognition integration — where aesthetics meet functionality.
Contact
Always open to new opportunities, collaborations, or just a good conversation about cyber and AI.