Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

Don Andango

Manchester,UK

Summary

Experienced Information/Cyber Security Professional with passion for aligning security architecture plans and processes with security standards and business goals.

Extensive experience developing and testing security framework for on premise, mobile and cloud-based applications. Versed in robust network defense strategies.

Data protection management of business and security operations to ensure alignment with data protection regulations , mainly GDPR

Overview

11
11
years of professional experience
1
1
Certification

Work History

Information Security Analyst / Manager

Yodel
02.2018 - Current
  • Monitor use of data and regulated access to protect secure information.
  • Champion a culture of continuous improvement through regular evaluations of existing security measures against established benchmarks and metrics.
  • Working with other teams to enforce security of applications and systems.
  • Streamline threat monitoring processes for quicker identification of potential risks.
  • Develop clear documentation of policies, procedures, and guidelines related to information security management within the organization.
  • Develop, test and implement security policies, plans and procedures for organizational protection.
  • Risk Mitigation associated with remote access by implementing strict access controls for external users.
  • Collaboration with IT teams to ensure seamless integration of security measures into existing infrastructure.
  • Investigation and resolution of incidents of unauthorized access to sensitive information.
  • Manage relationships with third-party vendors to ensure timely delivery of essential security products and services.
  • Conduct internal audits to identify areas of improvement within the organization's information security program.
  • Support legal teams in investigations involving cyber crime or data breaches, providing crucial technical expertise.
  • Perform risk analyses to identify appropriate security countermeasures.
  • Recommend improvements in security systems and procedures.
  • Strengthen network security by conducting regular risk assessments and implementing appropriate countermeasures.
  • Implement security measures to reduce threats and damage related to cyber attacks.
  • Cultivate interpersonal skills by building positive relationships with others.
  • Demonstrate leadership skills in managing projects from concept to completion.
  • Ensuring compliance with industry regulations and legal requirements by implementing comprehensive policies and training programs for staff members.
  • Facilitate secure data sharing between departments by developing robust encryption protocols.
  • Boost cybersecurity awareness among employees through effective training sessions and workshops.
  • Conduct security audits to identify vulnerabilities.

Information Security Specialist

NHS - National Health Service
01.2013 - 02.2018
  • Led implementation of controls to protect confidential information.
  • Established a strong culture of cybersecurity by fostering collaboration between departments and promoting best practices throughout the organization.
  • Partnered with external vendors to evaluate and select appropriate tools for strengthening the company''s overall security posture.
  • Researched and developed new computer forensic tools.
  • Conducted security audits to identify vulnerabilities.
  • Demonstrated leadership skills in managing projects from concept to completion.
  • Investigated and resolved incidents of unauthorized access to sensitive information.
  • Monitored use of data files and regulated access to protect secure information.
  • Drafted security reports and metrics to track security performance and strategize improvements.
  • Monitored computer virus reports to determine when to update virus protection systems.
  • Analyzed network traffic and system logs to detect malicious activities.
  • Led successful implementation of ISO27001 Certification on corporate email system

Education

Bachelor of Science - Computing

Edge Hill University
Liverpool
06.2014

Skills

  • Data Protection
  • Vulnerability Assessment
  • Security Planning
  • Data Encryption
  • Infrastructure Assessment
  • Compliance Management
  • Network Security
  • Threat Intelligence
  • Security Awareness Training
  • Mobile Security
  • Cybersecurity Risk Management
  • SIEM management
  • Identity and Access Management
  • Security policy development
  • Intrusion Detection
  • Access Control
  • Application security
  • Information Governance
  • Risk Assessment
  • Security Architecture
  • Incident Response
  • Penetration Testing
  • Privacy Regulation Compliance
  • Security metrics

Certification

  • CISSP - Certified Information System Security Professional

Timeline

Information Security Analyst / Manager

Yodel
02.2018 - Current

Information Security Specialist

NHS - National Health Service
01.2013 - 02.2018

Bachelor of Science - Computing

Edge Hill University
Don Andango