About me

Adam is an experienced and senior consultant in Identity and Access Management (IAM) with deep technical expertise and a remarkable ability to solve complex problems. His pedagogical approach and strong communication skills enable him to successfully translate technical solutions for both technical and non-technical stakeholders at all levels within an organization. Adam is highly valued by both colleagues and clients for his competence, reliability, and commitment. He has successfully operated in several critical infrastructure environments, clearly highlighting his ability to manage complex and sensitive projects with the highest level of integrity. With a strong drive and a solution-oriented mindset, Adam strives to exceed client expectations and deliver results of the highest quality with precision and professionalism.

Experience and Projects

Knowit Cybersecurity and Law

Solution Architect & IAM Expert

Sep. 2019 - present

  • Acts as a trusted advisor and solution architect helping clients across multiple industries such as finance, energy, education, and public sector to modernize their identity and access management (IAM) landscapes.
  • Leads the design and implementation of secure, scalable, and regulatory-compliant IGA and IAM solutions, driving digital transformation with measurable business impact.
  • Defines and implements target architectures for identity lifecycle management, access governance, and role-based access control to reduce operational risk and improve compliance posture.
  • Provides strategic guidance on IAM process optimization and integration of hybrid and cloud infrastructures, ensuring business continuity and strong security alignment.
  • Mentors and coaches client architects and technical teams to strengthen organizational IAM maturity and autonomy.
  • Oversees migrations from legacy systems to modern identity fabrics, ensuring minimal disruption and maximized return on investment.
  • Develops governance models, policies, and design frameworks to align identity management with broader cybersecurity strategy and regulatory frameworks.
  • Acts as a senior technical leader in projects requiring deep expertise in IGA, PAM, and Azure-based identity ecosystems.
  • Recognized for transforming complex IAM environments into efficient, auditable, and automation-driven platforms that enable secure access at scale.
  • Leads internal capability development through the Cyber Hero Program — designing and delivering hands-on training initiatives that accelerate consultants' readiness in cybersecurity and information law.
  • Continuously drives knowledge sharing, innovation, and best practices across projects and teams to elevate delivery quality and client satisfaction.

Education

Blekinge Institute of Technology

Master of Science in Computer Engineering with emphasis on Computer Security

September 2019 - June 2019

  • Five-year Master of Science in Computer Security (300 ECTS) combining a solid engineering foundation (math, programming, data analysis, AI) with advanced specialization in cybersecurity
  • Focus on practical cyber defence malware analysis, ethical hacking and penetration testing, digital forensics, network security, security for critical infrastructure, and hands-on work in advanced security labs often together with industry.
  • Strong labour market graduates work as security analysts, IT forensics specialists, or security managers in companies, government agencies, defence, and law enforcement (e.g. Swedish Police Security Service and National Forensics Centre).

Certifications

Skills

Sectors

Identity & Access Management

Architecture & Solution Design

Operating Systems & Servers

Database & ETL

Scripting & Programming Languages

Networking & Security