About Me

Insights into my professional experiences, research interests, and contributions in cybersecurity and beyond.

Who am I?

Hey there! I’m Tanguy, a devoted father and cybersecurity enthusiast living in the beautiful Normandy region of France. When I’m not enjoying family time or exploring the picturesque landscapes around me, you’ll find me deeply immersed in the world of cybersecurity, rolling dice in D&D sessions, or diving into whatever topic has recently captured my curiosity.

In the professional realm, I wear multiple hats and have a keen interest in various aspects of information security and programming. My primary focus areas include:

  • Software Development
  • Reverse Engineering
  • Cryptographic Implementations
  • IoT Security
  • Mobile Payment Systems
  • Security Research

These fields not only captivate my professional curiosity but also drive my passion for continuous learning.

Whether you’re a fellow security enthusiast, a potential collaborator, or just someone curious about any of those topics, I’m always open to engaging discussions.

Professional Experience

  • R&D Director

    • MailSPEC, Nice (France) | June 2022 - Present
      • Lead development of CommuniGate email solution, overseeing maintenance, feature improvements, and release management
      • Architected and delivered new products encompassing mobile applications, high-reliability servers, and web components
      • Directed security and cryptographic implementations across all company products
      • Drive R&D initiatives including research tax credit applications (French CIR/CII), patent submissions, and certification processes
      • Manage and mentor a team of 10 developers across mobile and backend platforms
      • Contribute hands-on development in C++, Python, Rust, Swift, and JavaScript for critical features and debugging
  • R&D Mobile Security Engineer

    • Dejamobile, Hérouville St. Clair (France) | Dec 2020 - June 2022
      • Developed mobile payment protection systems
      • Conducted vulnerability assessments
      • Engineered mobile security component of the Android SoftPOS solution
      • Managed mobile elements of the PCI-CPoC certification process and technical requirements
      • Owned and evolved native security components of Android payment SDK
      • Implemented advanced obfuscation techniques across NDK and SDK layers
  • PhD Candidate

    • Orange Labs, Caen (France) | Nov 2017 - Nov 2020
      • Researched IoT device adaptive security
      • Applied graph theory to IoT security challenges
      • Developed methodology for protecting whitebox cryptographic implementations
  • R&D Engineer

    • GREYC Laboratory, Caen (France) | Nov 2016 - Oct 2017
      • Developed biometric solutions and POCs
      • Worked on laboratory projects and industrial contracts
  • Junior R&D Engineer

    • United Biometrics, Orsay (France) | March - Oct 2016
      • Developed multi-modal biometric solution

Education

Skills

Languages

  • French (Native)
  • English (Professional - TOEIC: 920, CLES2)
  • Spanish (Basic)

Technical Skills

Mobile Development

  • Android (Java, Kotlin, C & Rust for NDK)
  • iOS (Swift)
  • Cross-platform (Xamarin, Flutter)

System Programming

  • C/C++
  • Rust
  • Python

Documentation

  • LaTeX
  • Markdown

Operating Systems

  • MacOS (Daily Driver)
  • Linux (Debian-based ❤️)
  • FreeBSD (Jailing IoT devices)
  • Windows (Native builds & WSL)

Teaching & Tutoring

  • Introduction to programming (C & Python) | 2019-2020
  • Android programming | 2017-2019
  • Tutoring (Master and Bachelor level students) | 2017-2021

Publications

Journal

  1. Godquin, T., et al. (2020). Applied graph theory to security: A qualitative placement of security solutions within IoT networks. Journal of Information Security and Applications, 55, 102640.

Proceedings

  1. Godquin, T., et al. (2021). A semantic approach for comparing Fog Service Placement Problems. 17th IFIP/IEEE Symposium on Integrated Network and Service Management (IM 2021), Bordeaux, France.
  2. Godquin, T., et al. (2019). Placement optimization of IoT security solutions for edge computing based on graph theory. 38th IEEE International Performance Computing and Communications Conference (IPCCC 2019), London, United Kingdom.
  3. Godquin, T., et al. (2018). IoT : Vers un contrôle des fonctionnalités au vu des menaces liées. Rendez-Vous de la Recherche et de l’Enseignement de la Sécurité des Systèmes d’Information, La Bresse, France.

Patents

  1. Configuration process of a communicating object in a communication network, user device, process for connecting a communicating object to the network, access equipment and corresponding computer programs.
Last updated on Oct 16, 2024 00:00 UTC
comments powered by Disqus
Built with Hugo
Theme Stack designed by Jimmy