A highly receptive and ambitious individual with two years of industry experience who is dedicated to protecting organisational assets and ensuring robust cybersecurity protocols are in place. Expertise in risk assessment, vulnerability management, and incident response, working closely with cross-functional teams to maintain compliance with industry standards and regulations such as ISO 27001, NIST and GCSS and Cyber Essentials. Has a proactive approach in identifying potential threats, coupled with strong problem-solving skills, to address complex security challenges effectively. Committed to continuous learning and staying updated with the latest security trends and technologies to strengthen and safeguard organisational systems while widening my own industry expertise to the ever evolving security landscape.
• Proactively identified business gaps within vulnerability patching and developed a cross-departmental project to ensure services, applications and operating systems are kept in line with government regulations and accreditation standards.
• Participated and supported regular security incident meetings, assisting security leadership with critical tasks to enhance overall security posture.
• Analysed Penetration Test findings and managed the rollout of remediation for the Pen Test results across the last two years.
• Generated regular vulnerability reports using Tanium, contacting affected users to support remediation efforts.
Created reports such as; Weekly Vulnerability Breakdown which analysed machines in line with CVSS Scoring and Environments that required immediate attention; Top Ten Vulnerable Machines that addressed specific machines most at risk on the estate; Software Breakdown, highlighting required updates and Out Of Support applications; OS EOL Tracker monitoring Operating Systems that are no longer in vendor support to aid in efficient tracking of vulnerabilities and remediations.
• Produced a MOD Cert Tracker to monitor government-mandated responses to security incidents.
• Validated new technology configurations for security and risk, including (COTS) commercial off-the-shelf devices and open-source applications.
• Managed the timely and efficient processing of security alerts and related queries within defined SLAs.
Initiated full ownership of the Change Control process, spearheading the development of documentation, policies, and request forms. Centralized all Information Security Requests within the procedure, ensuring seamless integration. Meticulously documented and tracked each request through all approval and review stages.
• Directed and supported employees in offering security expertise, ensuring the protection of business security while enabling smooth and efficient business operations.
• Compiled reports and correspondence consisting of data and conducted analysis on retrieved findings.
• Collaborate interdepartmentally with co-workers to assist in acquiring solutions to issues and maintaining communication through informing colleagues of updates or changes to systems or errors that have occurred.
• Ensuring updates and amendments of records are completed in a secure and timely manner.
Systems Security Certified Practitioner (SSCP)
ISC2
Working Towards
Certified Cyber Security Practitioner
CAPSLOCK
March 2023
ISO/IEC 27001:2022
British Standards Institute
March 2023
CompTIA Security+
Working Towards
Vulnerability Management – Spearheaded Tanium distribution across business endpoints, identifying and addressing security vulnerabilities, significantly reducing network risks and restoring a government-accredited network to SAU (Service as Usual). Assisted in deploying Splunk as an EDR solution for the Protective Monitoring team.
Incident Response and Management – Coordinated with stakeholders to update security incidents, ensuring compliance with government standards (GCSS, Government Security Classification Policy) and security principles while maintaining the CIA triad. Worked with Protective Monitoring to address vulnerabilities and alerts, including false positives/negatives, impacting the Digital Intelligence Cloud/Enterprise Estate.
Stakeholder Management – Collaborated with Executive Leadership, IT, Infrastructure and Service Delivery Managers to communicate security risks and strategies. Built strong relationships, offering actionable insights to integrate security through Security-By-Design, driving business and security success.
Security Tools Proficiency – Experienced with security tools like SIEM platforms (Splunk, QRadar), vulnerability scanners, IDS, endpoint protection (Tanium), and tools such as ServiceNow, Archer, Confluence, AWS Security, and Active Directory to enhance threat detection and ensure robust cybersecurity.