Over a three-year tenure as a Cyber Security Specialist, diverse skill sets were cultivated through collaboration with various teams. With a bachelor's degree in cybersecurity and computer forensics, a range of projects was spearheaded, covering Network Design, Discovery and Auditing, OS Hardening Techniques, and the implementation of security frameworks, particularly for email security using a defense-in-depth approach. The network design aspect involved constructing a network typology, selecting subnets, calculating hosts, and showcasing the solution on Packet Tracer to meet specific enterprise requirements.
Functioned as a data storage gatekeeper, assessing risks and providing solutions for unique use cases. My expertise in network communication protocols and cipher suites was pivotal in evaluating ciphers for the business's data system.
+ Collaborated with firewall and security teams to manage proxy operations.
+ Reviewed firewall and file sharing requests.
+ Identified and worked on resolving process and control gaps with senior management.
+ Drove security automation and developed custom playbooks.
+ Managed identity and access control requests, serving as first line of support and security reviewer.
Dynamic medium writer in cybersecurity, selecting topics with curiosity, showcasing a desire to simplify complex concepts. Craft engaging stories and analogies used, like comparing cloud security pillars to balanced diets, making intricate subjects accessible to a broad audience.
Provided day-to-day support to the team, including: cyber awareness, rollout of MFA to 2000 users, running phishing campaigns, monitoring and analysing security alerts.
+ Conducted Privacy Impact Assessments (PIAs) and supplier KYS reviews for triage assessments.
+ Provided NIST-aligned reporting and analysis to senior managers
+ Conducted breach and attack simulation tests, contributing insights for remediation plans to management.
Identity and Access Management
Authorization, Authentication, and Accounting
Confidentiality, Integrity, and Availability
IDS/IPS, SIEM Tools, Firewalls
Cloud Service Models (IaaS, PaaS, SaaS)
Vulnerability Assessments
Problem Solving
Network Access and Segmentation
Transport Layer Security
Cryptography (Cipher Suites)
Defense in-depth
COBIT 5, OWASP 10, ISO 27017
NIST CSF 20 , SP 800-144
Organisation, Writing, Presenting
2022 - Cisco Linux Essentials Certification | Completed- (Hons), Kingston University
2019 - Learning PRINCE2 | Completed
2019 - Program Management Foundations | Completed
2018 - Cisco Linux Essentials Certification | Completed