User Research
Experience Strategy
Service Mapping
Interface Architecture
Welcome to my portfolio
a short collection of work,
ideas, concepts,
services, and systems.
© Capabilities
(WDX® — 04)
Digital Execution
Services
(4)
Precise
Structured
Focused
Visual Language
01
UX & Product Design
We guide every visual decision from start to finish, ensuring clarity, emotion, and impact across every touchpoint.
02
Design Systems & UI Direction
Systems that connect teams and scale design with consistency. From language to interaction, every layer supports clarity and collaboration helping teams move faster, together.
03
User Research & Testing
Research turns behaviour into evidence, and evidence into confident decisions that guide better design.
04
Speculative & Service Design
Exploring how people, culture, and technology shape what comes next. Future artefacts and service blueprints translate uncertainty into imagination and action.
© Experience
(WDX® — 05)
Digital Craft
Practice.

Global
Creative Collabs
Studio
Creative Partnerships
Pluxee
2022 - present
UX Designer
Prague/Remote
Avast
2021 – 2022
UX Designer
Prague/Remote
Leveris
2018 – 2021
UX Designer
Prague/Remote
Mlada fronta
2008 – 2018
Product owner
Prague/Onsite
© University artefacts
(WDX® — 7)
LABORATORY

Designing Speculative artefacts
August 20, 2025
Design
When most people hear the word cybersecurity, they imagine hooded hackers and complex encryption. In reality, the biggest risks usually come from everyday human behavior weak passwords, clicking a suspicious link, or sharing documents without thinking.

From chaos to balance: My journey into life design
January 1, 2025
Design challenge
When most people hear the word cybersecurity, they imagine hooded hackers and complex encryption. In reality, the biggest risks usually come from everyday human behavior weak passwords, clicking a suspicious link, or sharing documents without thinking.
Speculative artefacts
January 1, 2025
Workshop
When most people hear the word cybersecurity, they imagine hooded hackers and complex encryption. In reality, the biggest risks usually come from everyday human behavior weak passwords, clicking a suspicious link, or sharing documents without thinking.














