{"id":71,"date":"2025-04-20T19:43:03","date_gmt":"2025-04-20T19:43:03","guid":{"rendered":"https:\/\/hackingdoc.com\/?page_id=71"},"modified":"2025-05-06T20:49:01","modified_gmt":"2025-05-06T20:49:01","slug":"la-historia-detras","status":"publish","type":"page","link":"https:\/\/hackingdoc.com\/pt\/la-historia-detras\/","title":{"rendered":"A hist\u00f3ria por tr\u00e1s"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;About&#8221; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#000000&#8243; custom_padding=&#8221;||0px|||&#8221; locked=&#8221;off&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;60px||60px||true|false&#8221; custom_padding_tablet=&#8221;0px||0px||true|false&#8221; custom_padding_phone=&#8221;0px||0px||true|false&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;047a0874-2e44-4e94-8cdb-382f789e0d47&#8243; header_2_text_color=&#8221;#FFFFFF&#8221; custom_margin=&#8221;||10px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Construyendo y compartiendo<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;8d6c1401-f837-4369-8235-ea30828979f3&#8243; text_text_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p data-start=\"159\" data-end=\"578\" class=\"\">Mi primer contacto con la tecnolog\u00eda fue bastante casual, pero marc\u00f3 un antes y un despu\u00e9s. Desde entonces, no he parado de explorar, aprender y compartir. A lo largo de los a\u00f1os, he trabajado en muchas \u00e1reas del mundo tech: desde infraestructura y software, hasta ciberseguridad, pasando por gesti\u00f3n de equipos, procesos y procedimientos. Siempre involucrado de manera pr\u00e1ctica, pero tambi\u00e9n ayudando a otros a crecer.<\/p>\n<p data-start=\"580\" data-end=\"1162\" class=\"\">He tenido la suerte de liderar proyectos, formar equipos y participar en iniciativas que mejoran la forma en que trabajamos con la tecnolog\u00eda, buscando siempre eficiencia, seguridad y buenas pr\u00e1cticas. Pero m\u00e1s all\u00e1 del trabajo, algo que me apasiona es compartir lo que s\u00e9. He dado charlas, talleres y cursos tanto en espacios formales como en comunidades open source y organizaciones sin fines de lucro. Creo firmemente en el poder del conocimiento compartido, y me gusta contribuir donde pueda sumar, ya sea ense\u00f1ando buenas pr\u00e1cticas o ayudando a otros a iniciarse en este mundo.<\/p>\n<p data-start=\"1164\" data-end=\"1477\" class=\"\">Me interesa especialmente la ciberseguridad, no solo como profesi\u00f3n, sino como responsabilidad colectiva. Creo que todos podemos aportar a un ecosistema m\u00e1s seguro y transparente, y por eso trato de mantenerme activo en la divulgaci\u00f3n y en apoyar iniciativas que promuevan una cultura tecnol\u00f3gica m\u00e1s responsable.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/open.spotify.com\/show\/3xMJf78MkSPCv6zEBtqH0Z&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;siguenos en spotify&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;545caba7-d4f9-472b-ab6a-2b1ff7b7fe20&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/hackingdoc.com\/wp-content\/uploads\/2025\/04\/piclumen-1745604547896.png&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; height_tablet=&#8221;50vw&#8221; height_phone=&#8221;50vw&#8221; height_last_edited=&#8221;on|tablet&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Stats&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#000000&#8243; custom_padding=&#8221;9px||9px|||&#8221; collapsed=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;047a0874-2e44-4e94-8cdb-382f789e0d47&#8243; header_2_text_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>\u00bfC\u00f3mo te puedo ayudar?<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;http:\/\/hackingdoc.com\/wp-content\/uploads\/2025\/04\/Augmented-Reality_Icon-@2x-16.png&#8221; title_text=&#8221;Augmented-Reality_Icon @2x (16)&#8221; align=&#8221;center&#8221; align_tablet=&#8221;left&#8221; align_phone=&#8221;left&#8221; align_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;9e21fc79-725e-4079-a378-563344945bb1&#8243; header_4_text_color=&#8221;#FFFFFF&#8221; custom_margin=&#8221;||10px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>Dise\u00f1o e implementaci\u00f3n de infraestructuras segurasugmented Experiences<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;8acfbaeb-3fa7-4bcc-9b97-e110908ae175&#8243; text_text_color=&#8221;rgba(255,255,255,0.7)&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Puedo ayudar a planificar, desplegar y optimizar infraestructuras tecnol\u00f3gicas robustas y escalables, con un enfoque en seguridad desde el dise\u00f1o.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;http:\/\/hackingdoc.com\/wp-content\/uploads\/2025\/04\/Augmented-Reality_Icon-@2x-9.png&#8221; title_text=&#8221;Augmented-Reality_Icon @2x (9)&#8221; align=&#8221;center&#8221; align_tablet=&#8221;left&#8221; align_phone=&#8221;left&#8221; align_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;9e21fc79-725e-4079-a378-563344945bb1&#8243; header_4_text_color=&#8221;#FFFFFF&#8221; custom_margin=&#8221;||10px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>Revisi\u00f3n y mejora de procesos y procedimientos<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;8acfbaeb-3fa7-4bcc-9b97-e110908ae175&#8243; text_text_color=&#8221;rgba(255,255,255,0.7)&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Apoyo a organizaciones a revisar, documentar y optimizar sus procesos internos, aplicando buenas pr\u00e1cticas que mejoran la eficiencia, trazabilidad y cumplimiento.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;http:\/\/hackingdoc.com\/wp-content\/uploads\/2025\/04\/Augmented-Reality_Icon-@2x-18.png&#8221; title_text=&#8221;Augmented-Reality_Icon @2x (18)&#8221; align=&#8221;center&#8221; align_tablet=&#8221;left&#8221; align_phone=&#8221;left&#8221; align_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;9e21fc79-725e-4079-a378-563344945bb1&#8243; header_4_text_color=&#8221;#FFFFFF&#8221; custom_margin=&#8221;||10px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>Capacitaci\u00f3n en ciberseguridad y buenas pr\u00e1cticas<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;8acfbaeb-3fa7-4bcc-9b97-e110908ae175&#8243; text_text_color=&#8221;rgba(255,255,255,0.7)&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Ofrezco talleres, cursos y charlas sobre seguridad, privacidad, y cultura de seguridad en equipos t\u00e9cnicos y no t\u00e9cnicos, adaptados a distintos niveles.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;http:\/\/hackingdoc.com\/wp-content\/uploads\/2025\/04\/Augmented-Reality_Icon-@2x-20.png&#8221; title_text=&#8221;Augmented-Reality_Icon @2x (20)&#8221; align=&#8221;center&#8221; align_tablet=&#8221;left&#8221; align_phone=&#8221;left&#8221; align_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.22.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;9e21fc79-725e-4079-a378-563344945bb1&#8243; header_4_text_color=&#8221;#FFFFFF&#8221; custom_margin=&#8221;||10px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>Mentor\u00eda y acompa\u00f1amiento a proyectos open source o sin fines de lucro<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;8acfbaeb-3fa7-4bcc-9b97-e110908ae175&#8243; text_text_color=&#8221;rgba(255,255,255,0.7)&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p data-start=\"825\" data-end=\"976\" class=\"\">Me involucro en iniciativas comunitarias, ayudando a equipos a crecer, mejorar sus pr\u00e1cticas t\u00e9cnicas y de gesti\u00f3n, y fomentar la colaboraci\u00f3n abierta.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Construyendo y compartiendoMi primer contacto con la tecnolog\u00eda fue bastante casual, pero marc\u00f3 un antes y un despu\u00e9s. Desde entonces, no he parado de explorar, aprender y compartir. A lo largo de los a\u00f1os, he trabajado en muchas \u00e1reas del mundo tech: desde infraestructura y software, hasta ciberseguridad, pasando por gesti\u00f3n de equipos, procesos y [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","episode_type":"","audio_file":"","podmotor_file_id":"","podmotor_episode_id":"","cover_image":"","cover_image_id":"","duration":"","filesize":"","filesize_raw":"","date_recorded":"","explicit":"","block":"","footnotes":""},"class_list":["post-71","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/hackingdoc.com\/pt\/wp-json\/wp\/v2\/pages\/71","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackingdoc.com\/pt\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/hackingdoc.com\/pt\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/hackingdoc.com\/pt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hackingdoc.com\/pt\/wp-json\/wp\/v2\/comments?post=71"}],"version-history":[{"count":18,"href":"https:\/\/hackingdoc.com\/pt\/wp-json\/wp\/v2\/pages\/71\/revisions"}],"predecessor-version":[{"id":305,"href":"https:\/\/hackingdoc.com\/pt\/wp-json\/wp\/v2\/pages\/71\/revisions\/305"}],"wp:attachment":[{"href":"https:\/\/hackingdoc.com\/pt\/wp-json\/wp\/v2\/media?parent=71"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}