About Experience Skills Certs Homelab Contact
Cybersecurity Consultant Brussels · Belgium

Yannick Van Campenhout

Yannick Van Campenhout portrait Brussels, now

Bridging the gap between deep technical execution and strategic security thinking.

4+
Years in security
11
Certifications
12+
Projects shipped
40k+
Users secured
§ 01 / About

From security to decisions

Belgium · 2020→Now

Cybersecurity Consultant at Cronos Security, Belgium. Before that, Deloitte, embedded inside some of Belgium's largest organisations, running enterprise-scale vulnerability management programs.

I'm a Cyberecurity Consultant at Cronos Security, Belgium. Before that, Deloitte, where I worked inside some of Belgium's largest organisations running enterprise-scale vulnerability management programs on Qualys, Tenable and Rapid7. At one client, we took a program sitting at 12M open vulnerabilities down to 3M, a ~75% reduction.

The work now spans DORA compliance, GRC, vulnerability management, IAM, and security architecture, plus the de facto project management that glues them together. Scanners and frameworks are the easy part. The harder problem is building programs teams actually follow.

The goal is to become a Swiss Army knife of cybersecurity. Someone who can hold their own across vulnerability management, risk, cloud, architecture and governance, and actually connect the dots between them. Trajectory points toward vCISO and strategic advisory.

Outside client work, the homelab is where everything gets tested before it gets recommended. Proxmox on bare metal, LXC-everything, docker containers, full observability stack, UniFi networking with proper VLAN segmentation, MCP servers wired into daily workflows. If it's worth deploying, it's worth breaking at home first.

Profile
Role
Cybersecurity Consultant @ Cronos Security
Company
Cronos Security
Location
Brussels, Belgium
Languages
Dutch C2 · English C2 · French C1/C2
Certifications
CEH | SSCP | AAWS CCP/SAA | PRINCE2/ITILv4 | ...
Education
Thomas More Hogeschool · 2019–2022
Focus areas 04
→ 01

Vulnerability Management

Qualys · Tenable · Rapid7. Took one client from 12M → 3 in a year.

→ 02

Risk management

Identifying, assessing, and mitigating IT risks across the organization.

→ 03

Governance & Compliance

ISO 27001, NIS2, DORA, etc. turning gap analyses into programs people follow.

→ 04

Always Building

CISPP in progress. Homelab running 24/7. Tested at home first.

§ 02 / Experience

Four years, two chapters

2024 — Now
2022 — 2024
Jul 2024 — Present
Kontich, Belgium
Cronos Security
Cybersecurity Consultant Full-time · Current
  • Embedded at enterprise clients across finance and regulated industries, running DORA compliance programmes, GRC, vulnerability management, pentesting and security architecture
  • Acting as de facto project manager across cross-functional security initiatives, coordinating stakeholders from 1st line risk to engineering
  • Building ICT risk control frameworks in ServiceNow GRC, including structured control groups mapped to regulatory and industry standards
  • Helped clients stand up cybersecurity programs from scratch, closing governance gaps via ISO 27001, NIS2 and DORA
Jun 2022 — Jul 2024
Zaventem, Belgium
Deloitte
Intern → Consultant → Senior Consultant Cyber Cloud team
  • Led VM programs inside Belgium's largest organisations: one went from 12M open vulnerabilities to 3M, a ~75% reduction
  • Cloud security assessments across Azure and AWS: architecture reviews, identity and access analysis, misconfiguration audits
  • NIS2 compliance roadmaps and gap analyses against ISO 27001 and DORA for enterprise clients across finance, logistics and public sector
  • Enterprise Security Architecture design — defining target states and the path to get there
  • During the internship, built an interactive AWS security demo used internally to illustrate real-world attack scenarios — first hands-on with Bash, Terraform and IaC
§ 03 / Skills

The toolkit

6 disciplines
→ 01 / Operations

Security Ops

Vulnerability ManagementIncident ResponseAsset ManagementThreat ModellingSecurity Assessments
→ 02 / Governance

GRC & Compliance

Risk ManagementNIS2GDPRITIL 4PRINCE2ISO 27001
→ 03 / Cloud

Cloud & Infra

AWSAzureTerraformBash ScriptingCloud Architecture
→ 04 / Design

Architecture & Design

Enterprise Security ArchitectureSecurity by DesignNetwork SegmentationZero Trust
→ 05 / Automation

AI & Automation

MCP ServersClaude / LLM WorkflowsSelf-hosted AIDocker / PortainerAutomation Pipelines
→ 06 / Stack

Tools & Platforms

ProxmoxUnifiHome AssistantServiceNow GRCMicrosoft DefenderSIEM PlatformsVulnerability Scanners
§ 04 / Certifications

Paper trail

11 active
Hover or tap a node · 11 certifications
2018
GDPR Advisor

GDPR — Data Protection Advisor

Katholiek Onderwijs Vlaanderen

Trained as a data protection advisor under Belgian GDPR implementation. Covered legal bases, data subject rights, DPIAs and breach notification procedures.

Feb 2018 — Feb 2019
2021
CEH

Certified Ethical Hacker

EC-Council

20 domains across attack phases, network scanning, malware, social engineering and web application hacking.

Aug 2021 · Active
2022
AZ-900

Microsoft Azure Fundamentals

Microsoft

Foundational Azure cloud concepts — core services, pricing, SLAs and governance.

Apr 2022 — Apr 2024
2022
AWS CCP

AWS Cloud Practitioner

Amazon Web Services

Broad AWS knowledge — core services, security, architecture, and billing.

Oct 2022 — Oct 2025
2022
AWS SAA

AWS Solutions Architect — Associate

Amazon Web Services

Designing distributed systems on AWS with focus on resilience, performance and security.

Nov 2022 — Nov 2025
2022
ITIL 4

ITIL 4 Foundation

PeopleCert

Service management — value system, guiding principles and the four-dimensions model.

Dec 2022 · Active (no expiry)
2023
SC-900

Security, Compliance & Identity Fundamentals

Microsoft

Identity, access management, threat protection, compliance and Zero Trust fundamentals.

Sep 2023 — Sep 2025
2024
PRINCE2

PRINCE2 Foundation

PeopleCert

Project management — 7 principles, themes and processes.

Jan 2024 — Jan 2027 · Active
2024
ISC2 CC

ISC2 Certified in Cybersecurity

ISC2

Entry-level ISC2 credential — security principles, network security, access controls and incident response.

Sep 2024 — Sep 2027 · Active
2025
SSCP

Systems Security Certified Practitioner

ISC2

Practitioner-level credential across 7 domains: access controls, risk, cryptography, network security, incident response.

Aug 2025 — Aug 2026 · Active
2025
Holm Admin

Holm Security Administrator Specialist

Holm Security

Platform-specific certification for managing the Holm Security vulnerability management platform.

Dec 2025 — Dec 2028 · Active
Next
CISSP

CISSP — Certified Information Systems Security Professional

ISC2

The gold standard. 8 domains from risk management to software security.

In sight · Long-term
GDPR Advisor
Katholiek Onderwijs Vlaanderen
2018
GDPR — Data Protection Advisor
Trained as a data protection advisor under Belgian GDPR implementation. Covered legal bases, data subject rights, DPIAs and breach notification procedures.
Feb 2018 — Feb 2019
CEH
EC-Council
2021
Certified Ethical Hacker
20 domains across attack phases, network scanning, malware, social engineering and web application hacking.
Aug 2021 · Active
AZ-900
Microsoft
2022
Microsoft Azure Fundamentals
Foundational Azure cloud concepts — core services, pricing, SLAs and governance.
Apr 2022 — Apr 2024
AWS CCP
Amazon Web Services
2022
AWS Cloud Practitioner
Broad AWS knowledge — core services, security, architecture, and billing.
Oct 2022 — Oct 2025
AWS SAA
Amazon Web Services
2022
AWS Solutions Architect — Associate
Designing distributed systems on AWS with focus on resilience, performance and security.
Nov 2022 — Nov 2025
ITIL 4
PeopleCert
2022
ITIL 4 Foundation
Service management — value system, guiding principles and the four-dimensions model.
Dec 2022 · Active (no expiry)
SC-900
Microsoft
2023
Security, Compliance & Identity Fundamentals
Identity, access management, threat protection, compliance and Zero Trust fundamentals.
Sep 2023 — Sep 2025
PRINCE2
PeopleCert
2024
PRINCE2 Foundation
Project management — 7 principles, themes and processes.
Jan 2024 — Jan 2027 · Active
ISC2 CC
ISC2
2024
ISC2 Certified in Cybersecurity
Entry-level ISC2 credential — security principles, network security, access controls and incident response.
Sep 2024 — Sep 2027 · Active
SSCP
ISC2
2025
Systems Security Certified Practitioner
Practitioner-level credential across 7 domains: access controls, risk, cryptography, network security, incident response.
Aug 2025 — Aug 2026 · Active
Holm Admin
Holm Security
2025
Holm Security Administrator Specialist
Platform-specific certification for managing the Holm Security vulnerability management platform.
Dec 2025 — Dec 2028 · Active
CISSP
ISC2 — In progress
Next
CISSP — Certified Information Systems Security Professional
The gold standard. 8 domains from risk management to software security.
In sight · Long-term
§ 05 / Homelab

Where things break first

Proxmox · Docker · Unifi

Everything I recommend to clients has already earned its place on a rack at home. The homelab is the proving ground — isolated, instrumented, audited end-to-end and always running.

< 4h
RTO target
< 24h
RPO target
12+
Services self-hosted
0
Outstanding audit findings
◇ From the trenches

What the lab has taught me

Running production-grade tooling at home means you break things before clients do. A few lessons from the trenches:

01Observability before optimisation.
You can't improve what you can't see. The Grafana dashboards came before anything clever.
02Segmentation is cheap, re-segmentation is not.
VLAN design on day one saved weeks of rework later.
03Backups are a feature, not a chore.
Offsite replication and restore drills, not just snapshots.
04Documentation compounds.
The Obsidian vault behind this lab is worth more than any single piece of kit.
¶ Process

Maintenance cadence

  • Scheduled patch cycles across hypervisor, hosts & containers
  • Monthly configuration reviews and drift checks
  • Hardware health monitoring with alerting thresholds
  • Quarterly re-audits against the baseline
¶ Resilience

Backup & DR

  • Layered backup strategy — hot, warm & cold tiers
  • Off-site replication for critical data
  • Snapshot-based VM recovery with tested restore paths
  • Documented disaster-recovery runbooks, periodically rehearsed
¶ Knowledge

Living documentation

  • Obsidian vault as the single source of truth
  • Architecture diagrams, asset inventory, VLAN maps
  • Runbooks, change logs & audit findings history
  • Updated continuously — not once-a-year theatre
// 01
Proxmox VE
Virtualisation & LXC
Flip

What's running

  • Hypervisor running a mix of VMs and LXC containers
  • Dedicated containers per service, isolated by function
  • Snapshot and clone workflows for fast rebuilds
  • Security lab VMs for detection and tooling tests
// 02
Docker & Portainer
Container Orchestration
Flip

What's running

  • Portainer-managed stacks for everything containerised
  • Self-hosted services deployed as isolated stacks
  • Reverse proxy with TLS for internal services
  • Compose-driven, versioned, and reproducible
// 03
UniFi Network
Enterprise-grade Networking
Flip

What's running

  • Multiple VLANs with strict inter-VLAN policies
  • Dedicated segments for IoT, lab, trusted and guest traffic
  • UniFi camera system with motion-based recording
  • Firewall rules and traffic inspection per VLAN
// 04
Monitoring & Observability
Full Stack Telemetry
Flip

What's running

  • Prometheus scraping metrics across the lab
  • Grafana dashboards for infrastructure, network and DNS
  • Loki aggregating logs from containers and hosts
  • Custom exporters for services without native metrics
// 05
Home Assistant
Smart Home Automation
Flip

What's running

  • Motion sensors with conditional automation logic
  • Lighting, climate and security automations
  • Integrations with UniFi cameras and the wider stack
  • Custom dashboards for real-time home monitoring
// 06
Security & AI
Hardening, Monitoring & MCP
Flip

What's running

  • Network-level isolation between all environments
  • Centralised logging and offsite backup strategy
  • Certificate management for internal services
  • MCP servers wired into daily workflows for local AI-assisted automation
§ 06 / Contact

Let's have a conversation.

Whether it's a security challenge, a collaboration, or you just want to talk homelab setups, always open to a good conversation.

Tweaks.