Experienced Information/Cyber Security Professional with passion for aligning security architecture plans and processes with security standards and business goals.
Extensive experience developing and testing security framework for on premise, mobile and cloud-based applications. Versed in robust network defense strategies.
Data protection management of business and security operations to ensure alignment with data protection regulations , mainly GDPR
Overview
11
11
years of professional experience
1
1
Certification
Work History
Information Security Analyst / Manager
Yodel
02.2018 - Current
Monitor use of data and regulated access to protect secure information.
Champion a culture of continuous improvement through regular evaluations of existing security measures against established benchmarks and metrics.
Working with other teams to enforce security of applications and systems.
Streamline threat monitoring processes for quicker identification of potential risks.
Develop clear documentation of policies, procedures, and guidelines related to information security management within the organization.
Develop, test and implement security policies, plans and procedures for organizational protection.
Risk Mitigation associated with remote access by implementing strict access controls for external users.
Collaboration with IT teams to ensure seamless integration of security measures into existing infrastructure.
Investigation and resolution of incidents of unauthorized access to sensitive information.
Manage relationships with third-party vendors to ensure timely delivery of essential security products and services.
Conduct internal audits to identify areas of improvement within the organization's information security program.
Support legal teams in investigations involving cyber crime or data breaches, providing crucial technical expertise.
Perform risk analyses to identify appropriate security countermeasures.
Recommend improvements in security systems and procedures.
Strengthen network security by conducting regular risk assessments and implementing appropriate countermeasures.
Implement security measures to reduce threats and damage related to cyber attacks.
Cultivate interpersonal skills by building positive relationships with others.
Demonstrate leadership skills in managing projects from concept to completion.
Ensuring compliance with industry regulations and legal requirements by implementing comprehensive policies and training programs for staff members.
Facilitate secure data sharing between departments by developing robust encryption protocols.
Boost cybersecurity awareness among employees through effective training sessions and workshops.
Conduct security audits to identify vulnerabilities.
Information Security Specialist
NHS - National Health Service
01.2013 - 02.2018
Led implementation of controls to protect confidential information.
Established a strong culture of cybersecurity by fostering collaboration between departments and promoting best practices throughout the organization.
Partnered with external vendors to evaluate and select appropriate tools for strengthening the company''s overall security posture.
Researched and developed new computer forensic tools.
Conducted security audits to identify vulnerabilities.
Demonstrated leadership skills in managing projects from concept to completion.
Investigated and resolved incidents of unauthorized access to sensitive information.
Monitored use of data files and regulated access to protect secure information.
Drafted security reports and metrics to track security performance and strategize improvements.
Monitored computer virus reports to determine when to update virus protection systems.
Analyzed network traffic and system logs to detect malicious activities.
Led successful implementation of ISO27001 Certification on corporate email system
Education
Bachelor of Science - Computing
Edge Hill University
Liverpool
06.2014
Skills
Data Protection
Vulnerability Assessment
Security Planning
Data Encryption
Infrastructure Assessment
Compliance Management
Network Security
Threat Intelligence
Security Awareness Training
Mobile Security
Cybersecurity Risk Management
SIEM management
Identity and Access Management
Security policy development
Intrusion Detection
Access Control
Application security
Information Governance
Risk Assessment
Security Architecture
Incident Response
Penetration Testing
Privacy Regulation Compliance
Security metrics
Certification
CISSP - Certified Information System Security Professional