Cyber Security Operations Procedures, Policy and procedure writing, Network and Systems Security, Data Protection, GDPR, ISO 27001, Firewall configuration, Secure design and architecture,...Read moreCyber Security Operations Procedures, Policy and procedure writing, Network and Systems Security, Data Protection, GDPR, ISO 27001, Firewall configuration, Secure design and architecture, Technical documentation, Regulatory Compliance (GRC), Policy Planning / Implementation, Project Management, Data Integrity / Disaster Recovery, Risk Assessment / Impact Analysis, Technical Specifications Development
Technical Proficiencies:
Platforms: Windows 7/8.1/10, Windows Server 2003- 2012 R2, Active Directory Domain Services, AD tools, IIS, Powershell scripting, security consulting on AWS
Security Tools: HP ArcSight, IBM Qradar, Qualys (VM, TP, AV, Web scanning, PCI), Check Point Firewalls, Splunk, MimeCast, Varonis, Sophos Enterprise Console - Client Endpoint, Palo Alto Firewall,
Networking: LAN/WAN, IDPS, TCP/IP, VPN, VLAN
Standards, Best practices: ISO 27001, 27002, 27008, Common Criteria - ISO 15408, COBIT, ISACA guidelines, OWASP, PCI DSS, SDLC, ITIL v3, SANS TOP 20, DPA, GDPR, Cyber Essentials, ISF SoGP