Highly skilled Cybersecurity Engineer with 7 years of experience. Specialized in safeguarding organizations from cyber threats.
Achievements:
Reduced security incidents by 20% through proactive threat mitigation.
Achieved a 15% reduction in critical vulnerabilities within 3 months.
Maintained compliance with [NIST, CIS, ISO], improving scores by 40%.
Decreased incident response time by 40% for swift threat resolution.
Elevated security maturity by 20% through framework implementation.
Integrated threat intelligence, boosting threat detection by 30%.
Enhanced employee cybersecurity awareness, reducing human errors by 60%.
Optimized security tools, improving detection accuracy by 20%.
Collaborated cross-functionally for a 20% reduction in security incidents.
Streamlined reporting, increasing accuracy and efficiency by 20%.
Overview
6
6
years of professional experience
1
1
Certification
Work History
Senior Cloud Security Engineer
Indicina
01.2022 - 12.2023
Designed and implemented zero trust network architecture using microsegmentation, software-defined perimeters and adaptive access controls, reducing lateral movement risks.
Built and managed secure cloud infrastructure on AWS using Infrastructure-as-Code tools like CloudFormation and Terraform.
Automated provisioning and hardening of AWS resources through customized AWS Landing Zones adhering to security best practices.
Developed CI/CD pipelines for security policy enforcement and threat detection code enabling continuous security integration.
Implemented central log collection, correlation and alerting capabilities leveraging AWS services like CloudWatch and open source ELK stack.
Performed static (SAST) and dynamic (DAST) application security testing, reduced vulnerabilities by 30% within 6 months.
Conducted infrastructure, web and mobile app pen testing exercises to identify security gaps. Remediated findings through patching, configuration changes and WAF policies.
Maintained continuous compliance for PCI DSS, ISO 27001 through control gap assessments, evidence collection and security audits.
Security Engineer
Deimos
04.2020 - 12.2021
Conducted security assessments and audits, identifying security gaps and recommending remediation actions
Assisted in the development of disaster recovery plans and participated in tabletop exercises
Collaborated with cross-functional teams to define security requirements for new cloud projects
Managed AWS security groups, network ACLs, and identity and access management (IAM) policies to control access to cloud resources, adhering to NIST and ISO27001 standards
Developed and implemented security monitoring and alerting solutions using AWS CloudWatch and AWS CloudTrail, aligning them with NIST and ISO27001 requirements
Conducted security assessments and audits, identifying security gaps and recommending remediation actions in compliance with NIST and ISO27001 standards
Assisted in the development of disaster recovery plans and participated in tabletop exercises, ensuring alignment with relevant standards
Collaborated with cross-functional teams to define security requirements for new cloud projects, taking into consideration NIST, PCIDSS, and ISO27001 guidelines
Assisted in the development of security awareness and training programs for employees, emphasizing NIST and ISO27001 compliance
Assisted in the development of security awareness and training programs for employees.
Enterprise Security Engineer (Lead)
Konga.com (E-Commerce)
08.2017 - 03.2020
Implemented MFA, DLP, SIEM and other security solutions—validated through security testing.
Trained development teams on secure coding practices, vulnerability management and remediation processes.
Led ISO 27001 and PCI DSS initiatives including gap assessments, control implementation and process documentation.
Developed and implemented security standards, policies, baselines aligned with ISO 27001, PCI DSS and industry frameworks.
Create ISO 27001:2013 internal audit reports in accordance with ISO/IEC 27001 requirements and internal processes
Monitors, analyzes, and remediates IT security risk and vulnerabilities by adhering to defined operating procedures; reviewing metrics to identify outliers, inefficiencies, and non-standard actions
Applied leading theories and concepts to development, maintenance and implementation of information security standards, procedures and guidelines.
Education
Master of Science - Cybersecurity
University of Sunderland
United Kingdom
Bachelor of Science - Information Communication Technology