Technical execution. Evidence that holds.
27 years of hands-on SOC builds, SIEM configurations, KQL detection engineering, AI architecture, and regulatory audit production. 85 MITRE-mapped detection rules deployed. MTTD reduced 36 hrs → 18 min. Zero breaches over 4 years across all mandates.
Technical Stack Mastery
Proven expertise across industry-leading SIEM, EDR, threat hunting, and compliance platforms. Tool-level operational delivery, not consultancy theory.
Microsoft Sentinel
85 MITRE-mapped detection rules deployed. 60+ log sources integrated. MTTD reduced from 36 hrs → 18 min. MTTR improved 73%. Logic Apps SOAR playbooks for automated containment and ticketing.
Splunk SIEM & RBA
Risk-Based Alerting configuration reducing false positives from 500+/day to 12/day (98% noise reduction). SPL correlation rules, custom dashboards, and DORA-aligned detection workflows.
Azure Defender & MDE
Defender for Endpoint hardening across enterprise estates. Defender for Cloud CSPM, threat analytics integration, and automated investigation across hybrid Azure environments.
KQL (Kusto Query Language)
85 production detection rules covering brute force, lateral movement (PtH/PtT), privilege escalation, data exfiltration anomalies, and C2 beacon detection. Operational at enterprise scale.
PAM & IAM Full Stack
CyberArk (Vault, CPM, PVWA, PSM — 84% incident reduction), BeyondTrust Powerbroker, SailPoint IGA for identity governance and user access reviews. Okta SSO/MFA, Azure AD / Entra ID, Azure PIM JIT, SCIM provisioning, and SAML/OAuth/OIDC federation across enterprise estates.
Wireshark & Burp Suite Pro
Packet-level forensics for incident response, protocol dissection, C2 traffic identification. Burp Suite Pro for OWASP Top 10 assessments and API security validation across enterprise applications.
Network Security Platforms
26 years across Checkpoint (CCSE — Provider-1, NGX R70–R77, Cloud Guard), Cisco ASA/PIX/VPN (CCNA Security), Juniper Netscreen/SRX/SSG/ISG/SA4000 (JNCIS-FWV), Palo Alto PA-2000/3000/M-100, Fortinet FortiGate, Meraki MX/MR, Sophos XG/Intercept X, WatchGuard, Barracuda, Forcepoint, and Tufin/AlgoSec policy management.
MITRE ATT&CK & Nessus
85 detection rules mapped across 11 MITRE ATT&CK tactics. Purple team exercise design, threat modelling, detection gap analysis. Nessus / Qualys / Foundstone for vulnerability scanning and compliance-driven remediation.
CrowdStrike & Multi-EDR
CrowdStrike Falcon (Sensors, Falcon X, EDR, Breach Prevention, NGAV, Device Control), SentinelOne, Carbon Black, Cylance, M365 Defender, McAfee EPO, Symantec Endpoint Protection. Threat hunting workflows, container security, and Zero Trust endpoint enforcement.
Multi-SIEM Platform Delivery
Operational across 7 SIEM platforms: Microsoft Sentinel, Splunk, IBM QRadar, ArcSight ESM, LogRhythm, RSA Security Analytics, and RSA Envision. Log source onboarding, correlation rule creation, dashboard design, and SOC analyst workflow optimisation.
DLP, CASB & Web Security
Symantec DLP, Forcepoint DLP, Microsoft DLP / Insider Risk Manager. Symantec CloudSOC (Securlet/Gatelet) CASB deployments. Websense / Zscaler web filtering, Bluecoat proxies, Akamai Kona Site Defender / Siteshield. UBA baselines and APT detection workflows.
VMware & Virtualisation Security
VMware vCenter Configuration Manager (VCM), ESXi host hardening, NSX micro-segmentation, vSAN encryption, Horizon VDI security. CyberArk PAM integration for VMware ESXi privileged access. Cisco ACI / APIC software-defined networking and security policy automation across data centre environments.
IAM Full Platform Stack
7 years' architecture and implementation of Oracle Identity Manager (OIM), Oracle Access Manager (OAM), Oracle Identity Federation. ForgeRock AM/IDM, One Identity, Ping Identity for SSO/Federation. HashiCorp Vault + Conjur for secrets management (5+ years). Full PAM breadth: CyberArk, BeyondTrust, Thycotic/Delinea, Centrify, Lieberman, CA/Broadcom PAM.
ITSM, Endpoint & Observability
ServiceNow ITSM for security incident integration and automation. BMC Remedy for CSIRC ticketing workflows. Microsoft Intune / SCCM / BigFix / Jamf for endpoint management and compliance. Rapid7 InsightVM/InsightIDR for vulnerability and incident detection. ELK Stack (Elasticsearch, Kibana, Logstash) for log analytics and SIEM augmentation.
Digital Forensics & BCP/DR
Established internal forensics practice saving $250K+ in discovery costs. EnCase, FTK forensic investigation tools. Threat modelling: STRIDE, PASTA methodologies. NDR / XDR deployment across enterprise. ISO 22301 Business Continuity Management, DR planning with documented RTO/RPO, failover runbooks, and BCDR testing programmes.
SOC Lab Architecture
Blueprint for enterprise-grade SOC deployment: Azure Sentinel workspace with integrated detection, response, and automation tiers.
Log Sources (60+)
- Azure AD & Entra Sign-in Logs
- Defender for Endpoint / M365
- Network Flows, Proxies, DNS
- Syslog, CEF & Custom Connectors
- Office 365 Audit Logs
- Cisco / Juniper / Palo Alto feeds
- CyberArk & PAM audit trails
- SAP, Salesforce & SaaS sources
Detection Engineering
- 85 MITRE-mapped KQL rules
- Brute force & credential stuffing
- Lateral movement (PtH / PtT)
- C2 beacon identification
- Data exfiltration anomalies
- Privilege escalation (4720/4728)
- MTTD: 36 hrs → 18 min
- MTTR improved 73%
Response & Automation
- Logic Apps playbooks
- Auto-blocking & quarantine
- SOAR integration
- Ticket auto-creation
- Escalation workflows
- Evidence preservation
KQL Detection Engineering
Production-grade Kusto queries deployed across Microsoft Sentinel for real-time threat detection and incident response.
Brute Force Login Detection
Authentication// Brute Force Login Detection
SigninLogs
| where TimeGenerated > ago(1h)
| where ResultType !in ("0", "50125", "50140")
| summarize FailedAttempts = count(),
DistinctIPs = dcount(IPAddress)
by UserPrincipalName, bin(TimeGenerated, 5m)
| where FailedAttempts > 10
| extend RiskLevel = iff(FailedAttempts > 50,
"HIGH", "MEDIUM")
| project TimeGenerated, UserPrincipalName,
FailedAttempts, DistinctIPs, RiskLevel
Lateral Movement via Pass-the-Hash
Persistence// Lateral Movement via PTH
SecurityEvent
| where EventID == 4624
| where LogonType == 3
| where AuthenticationPackageName == "NTLM"
| where WorkstationName != ComputerName
| summarize Hops = dcount(Computer),
Targets = make_set(Computer)
by SubjectUserName, IpAddress
| where Hops > 3
| extend ThreatScore = Hops * 10
| project SubjectUserName, IpAddress,
Hops, Targets, ThreatScore
Anomalous Data Upload Detection
Exfiltration// Anomalous Data Upload
AzureNetworkAnalytics_CL
| where TimeGenerated > ago(24h)
| where FlowDirection_s == "O"
| summarize TotalBytes =
sum(BytesSentToInternet_d)
by SrcIP_s, bin(TimeGenerated, 1h)
| where TotalBytes > 100000000
| join kind=leftouter (
DeviceNetworkEvents
| where ActionType == "ConnectionSuccess"
) on $left.SrcIP_s == $right.LocalIP
| project SrcIP_s, TimeGenerated, TotalBytes
Privilege Escalation Attempt
Escalation// Privilege Escalation Detection
SecurityEvent
| where EventID in (4720, 4722, 4728, 4732)
| where SubjectUserName !in ("SYSTEM", "root")
| summarize EscalationCount = count(),
TargetAccounts = make_set(
TargetUserName)
by SubjectUserName, Computer
| where EscalationCount > 5
| extend AlertSeverity = "High"
| project SubjectUserName, Computer,
EscalationCount, TargetAccounts
Audit & Compliance Execution
Evidence production at scale. CAF A-D scoring matrices, ISO 27001 control mapping, and NIS submissions accepted on first presentation.
CAF A-D Evidence Production
Produced IGP scoring matrices, evidence packs, control mapping documents, and gap analysis reports for all 4 CAF objectives: A (Governance), B (Protect), C (Detect), D (Respond & Recover). Delivered to NCSC-reporting regulators.
ISO 27001 → CAF Control Mapping
Cross-mapped ISO 27001 Annex A controls to CAF objectives, producing control equivalence matrices that eliminated duplicate assessment effort and reduced compliance overhead by ~40%.
NIS Regulatory Submissions
Produced end-to-end NIS submissions for Operators of Essential Services across energy and finance. All submissions accepted by sector regulator on first presentation. Zero remediation demands.
AI + Cyber Security
As the threat surface expands into AI-generated phishing, LLM exploitation, and model poisoning attacks, your security architecture must evolve. 27 years of cyber delivery meets 2026's AI threat landscape.
LLM Security & Prompt Injection Defence
Azure OpenAI (GPT-4o) secure deployment, adversarial prompt testing, jailbreak detection, output sanitisation. OWASP LLM Top 10 assessment. ISO 42001 AI management system implementation (in progress). AI model sandboxing and guardrail architecture.
AI-Driven SIEM & RAG Architecture
Azure ML anomaly detection integrated with Sentinel. RAG pipelines using Azure Document Intelligence + LangChain + Semantic Kernel processing 2.5M+ documents/year at 94–96% accuracy. 12M+ API calls/month at <200ms p95 latency.
AI Governance & Model Risk
EU AI Act Article 9 risk management. ISO 42001 AI management system. Model inventory, bias testing, and transparency documentation. Azure AI Engineer Associate certified. AI incident classification under DORA, NIS2, and EU AI Act reporting obligations.
MITRE ATT&CK Coverage Map
Detection and response coverage across MITRE ATT&CK tactics. Mapped techniques inform SOC detection strategy and purple team exercise design.
85 detection rules deployed across 11 MITRE ATT&CK tactics. Figures represent technique sub-coverage within each tactic category, as measured against the full MITRE ATT&CK Enterprise matrix.
Quantified Delivery Impact
Every engagement produces documented, auditable results. Numbers from real deployments — not estimates.
SOC & SIEM Performance
Security & Compliance
Cloud & AI Engineering
Cloud, DevOps & Data Architecture
Full-stack cloud architecture delivery. Security controls embedded at infrastructure layer, not retrofitted. Azure Expert certified.
Multi-Cloud Architecture
Azure Expert (certified): Hub-Spoke topology, AKS, Azure Functions, Logic Apps SOAR, private endpoints, multi-region. AWS: EC2, S3, VPC, IAM, CloudTrail, GuardDuty, Security Hub. GCP: Cloud Security Command Center, Identity-Aware Proxy. €480K/year cloud cost optimisation delivered across multi-cloud estate.
DevSecOps & Automation
Terraform, ARM/Bicep for IaC. Azure DevOps and GitHub Actions CI/CD with SAST/DAST gates. Docker, Helm, Kubernetes, GitOps, Blue-Green deployments. Ansible, Jenkins, and Python automation. Source code analysis: Fortify, Coverity, Klocwork, Findbugs, FxCop — integrated into secure SDLC pipelines.
Data & Backend Engineering
.NET Core 8 (C#) and Python (FastAPI/Flask/Django) backend systems. Azure Synapse Analytics, Databricks (Apache Spark, Delta Lake), Data Factory pipelines, Cosmos DB, MongoDB, and Redis for enterprise-scale data platforms.
13 Active Certifications
Certifications spanning security governance, cloud architecture, AI engineering, and network infrastructure — all active, all examined, not honorary.
CISSP
Certified Information Systems Security Professional — (ISC)². The global gold standard for senior information security practitioners.
Governance & RiskCISM
Certified Information Security Manager — ISACA. Information security governance, risk management, and program development.
Security ManagementCRISC
Certified in Risk and Information Systems Control — ISACA. Enterprise risk management, IT risk identification, and control implementation.
Risk & ControlCCSP
Certified Cloud Security Professional — (ISC)². Cloud data security, platform architecture, and compliance across multi-cloud environments.
Cloud SecurityAzure Solutions Architect Expert
AZ-305. Advanced cloud architecture, hybrid networking, identity, storage, and security across Azure enterprise platforms.
Azure ExpertAzure Security Engineer Associate
AZ-500. Azure security controls, identity protection, platform security, data and application security implementation.
Azure SecurityAzure AI Engineer Associate
AI-102. Azure Cognitive Services, Azure OpenAI, Document Intelligence, and responsible AI implementation for enterprise workloads.
AI EngineeringAzure Administrator Associate
AZ-104. Azure infrastructure administration, virtual networking, compute, storage, and identity management at enterprise scale.
Azure AdminCCSE — Checkpoint
Checkpoint Certified Security Expert. Next-generation firewall policy, VPN configuration, and advanced threat prevention on Checkpoint platforms.
Network SecurityJNCIS-FWV — Juniper
Juniper Networks Certified Specialist – Firewall/VPN. Juniper firewall and VPN configuration, policy management, and network security architecture.
Network SecurityCCNA Security
Cisco Certified Network Associate Security. Cisco firewall, IPS, VPN, and network infrastructure hardening across enterprise Cisco environments.
Network SecurityISO 27001 Lead Implementer & Lead Auditor
Dual certification: ISMS design and implementation (Lead Implementer) and third-party ISMS audit and certification (Lead Auditor). BSI certified.
ISO 27001 Lead AuditorISO 42001 — AI Management System Lead Implementer
The world's first AI management system standard. Implementing Article 9-aligned risk frameworks for AI system governance, bias testing, transparency obligations, and incident reporting under EU AI Act.
MBA — Information Technology
Master of Business Administration with specialisation in Information Technology management. Strategic IT governance, enterprise architecture decision-making, and business-aligned security leadership.
MBA-ITBEng — Bachelor of Engineering
Bachelor of Engineering degree forming the technical foundation for 26+ years of security architecture, network engineering, and enterprise systems design across regulated industries.
BEngLeadership, Business & Professional Profile
Cyber security leadership is more than tooling — it demands executive gravitas, commercial acumen, stakeholder command, and institutional credibility built across three decades of regulated-sector delivery.
Executive Leadership & Strategic Direction
26+ years directing security strategy at Board, C-suite, and regulatory levels. Proven executive presence: presenting to FCA, PRA, NCSC, and financial sector boards. Led transformation programmes across Co-Op Bank, RBS, Santander, Allianz, HSBC, and Europa FS. Managed $20M+ security budgets. Directed Corporate PMO with six project managers.
Business & Commercial Acumen
Negotiated a $30M enterprise software renewal deal across cross-business stakeholders. Saved $1M+ renegotiating IT contracts by eliminating duplicated solutions. Governed $4.5M annual Managed IT Services contract. Directed data centre migration delivering $1M annual savings. Directed Office 365 migration saving $750K annually across 8,500 mailboxes.
Stakeholder Engagement & Communications
Trusted advisor to CEOs, CFOs, CIOs, and risk committees. Spearheaded security awareness programmes reducing security events by 30%. Expert in mapping requirements across business, legal, compliance, and technology functions. Extensive cross-cultural delivery across UK, Europe, UAE, and APAC. Fluent in technical and business language at every organisational level.
Personal Qualities & Leadership Attributes
Analytical thinker, decisive under pressure. TalentSmart Emotional Intelligence certification. Strategic visionary with operational delivery capability. Coach and mentor to junior architects and security managers. Crisis management and major incident command experience. Problem-solving mindset with strong negotiation and influencing capabilities at all levels.
Academic, Research & Professional Standing
Honorary Senior Lecturer at Imperial College London. Researcher at University College London (UCL). Platinum Member, ISACA London Chapter (Lead Auditor). Gold Member, ISC² London Chapter. Cyber Security Programme Lead, PRMIA. Associated with KPMG, Ernst & Young, PwC France. Excellence in Education Award (EMEA 2015–16). Top Teacher Award 2013–14.
Industry Sectors & Domain Expertise
Financial services (Tier-1 investment & retail banking, insurance, Lloyd's). Regulatory delivery: FCA, PRA, NCSC, MoD security agencies, MAS Singapore. Aviation (BAA). Utilities & critical national infrastructure (Network Rail). Automotive (TISAX). Healthcare/pharma (NHS, HIPAA, GxP, FHIR). Manufacturing (Rolls-Royce). Retail (Tesco, PCI-DSS Level 1). Aerospace, defence, and government.
Programme & Project Delivery Excellence
Prince2, ITIL, Agile, SAFe, and waterfall/hybrid delivery across enterprise security transformations. Third-party risk management across 300+ critical vendors. AI Strategy & Transformation leadership. Cloud-native transformation programmes spanning 25+ countries. Delivered DORA, NIS2, and Operational Resilience programmes for PRA-supervised institutions. Associated with Deloitte engagements alongside KPMG, EY, PwC.
Awards, Honours & Recognition
The Circle of Excellence Award. The High Flyers Award. The Super Coach Award. Excellence in Education Award (EMEA) 2015–16. Top Teacher Award 2013–14. Associated with KPMG, Ernst & Young, and PwC France engagements. Recognised as Top 1% global cyber security professional. 26-year track record of delivery at the highest regulated-sector standards.
Extended Technical Arsenal
Complete tool and platform coverage accumulated across 26 years of Big 4 consulting, financial sector delivery, and regulated industry mandates including FCA, PRA, and multiple security agency engagements.
See the governance infrastructure behind the detection work
Behind every detection rule sits an audit trail. Behind every SOC operation sits a governance mandate. Behind every regulatory submission sits engineering rigour.