Results-oriented cyber security leader with 14 years of extensive experience in achieving remarkable outcomes in cyber security leadership and management, compliance & governance, cyber security project management, IBM & Palo Alto Networks, ISO 27001:2022 audit, NSW Cyber security policy compliance, ACSC Essential 8 Implementation, cybersecurity incident response & business continuity planning, cybersecurity threat intelligence, cybersecurity analytics, penetration testing, public policy analysis, digital transformation, change management, data science, big data, public speaking, training, cloud services, smart cities, enterprise architecture, IoT, wireless communication, improving business operations & data-driven decision making. Enterprise Cyber Security Specialist with passion for aligning security architecture plans and processes with security standards such as ISO 270001, PCI DSS, NIST, CIS and business goals. Versed in advance threat intelligence & robust network defense strategies. Demonstrated skill identifying business risks and compliance issues and designing proactive IT governance & risk mitigation solutions. Well-qualified cybersecurity expert, data & research scientist experienced working with vast data sets to break down network scanning information, gather relevant points and detect advanced cyber threats and business risks. Skilled in AI, descriptive & predictive modeling, data mining, machine learning, visualization, reporting and hypothetical testing. Adept at coordinating with various local, state & Federal subdivisions and facilitating change in a community to support organizational goals. Possess proven success in cyber program & risk management, budgeting, operational characteristics & services, cross-departmental project management, information technology planning & utilization, review and analyze data and deliver information in a comprehensible dashboard manner. Solid background in relationship management, team management and general business acumen coupled with extensive track record of mitigating security flaws within highly competitive and complex organizations. Information Security Specialist with passion for aligning security architecture plans and processes with security standards and business goals. Extensive experience developing and testing security framework for cloud-based software. Versed in robust network defense strategies. Detail-oriented team player with strong organizational skills. Ability to handle multiple projects simultaneously with a high degree of accuracy.
Successfully designed company-wide policies to bring operations in line with Center for Internet Security (CIS), ISO27001, ACSC Essential 8, NSW CSP & NIST standards.
Developed and maintained efficient incident response protocols to mitigate damage and liability during security breaches.
Reviewed violations of computer security procedures and developed mitigation plans.
Selected and installed company-wide Intrusion detection & prevention systems.
Created cybersecurity best practice communications to educate staff against known threats and potential vectors of attack.
Collaborated with third-party payment card industry (PCI) compliance partners.
Skilled at working independently and collaboratively in a team environment.
Proved successful working within tight deadlines and a fast-paced environment.
Used critical thinking to break down problems, evaluate solutions and make decisions.
Conducted Lectures and Hands-on Labs for state-of-the-art Cyber Security experiments.
Prepared comprehensive content for Cyber Security Awareness
Successfully organized workshops and lectures for Cyber Risk Management.
GRC Approach for Managing Cyber Security by University Systems of Georgia, USA.
Cyber Security Leadership and Management Specialization by INFOSEC
Cybersecurity Compliance Framework & System Administration by IBM
Cyber Security Awareness & Innovation by eit Digital Europe
Palo Alto Networks Cybersecurity Foundation by Palo Alto Networks
In the Trenches: Security Operations Centre by EC-Council
Penetration Testing, Incident Response and Forensics by IBM
Cyber Incident Response Specialization by INFOSEC
Cyber Threat Intelligence by IBM
Data-driven Decision Making by PwC
Network Security & Database Vulnerabilities by IBM
Cybersecurity Roles, Processes & Operating System Security by IBM
Introduction to Cybersecurity Tools & Cyber Attacks by IBM
IT Fundamentals for Cybersecurity by IBM
Cyber Security in Healthcare by Erasmus University Rotterdam
Cyber Security with Cloud Computing
Cert Prep: Project Management Professional (PMP) by PMI
Six Sigma: Green Belt
AWS Certified Solutions Architect - Associate (SAA-C01): 1 Cloud Services Overview (2019)
ITIL Foundation 4 First Look
Software Development Life Cycle (SDLC)
Advanced Microsoft Power BI
Blockchain Transformation of Financial Services by INSEAD
Certified Information Security Manager (CISM) in progress by ISACA
ISO 27001 Lead Auditor
Risk Governance: Manage The Risks by Macquarie University