Accomplished professional with extensive expertise in network and information security, system administration, and vulnerability assessment. Demonstrates proficiency in incident management and response, security architecture, and firewall management. Skilled in conducting cloud security assessments and investigations, ensuring endpoint security, and maintaining regulatory compliance. Adept at implementing encryption technologies and managing identity and access systems. Experienced in server optimisation and hardening, hardware maintenance, backup administration, and change management. Committed to advancing a career focused on enhancing organisational security frameworks through innovative solutions.
Identity & Access Management (IAM)
Security Platforms & Tools
Automation & Scripting
Compliance & Frameworks