Full-Spectrum Capability Skills & Competencies
27 years of hands-on delivery across technical security architecture, enterprise leadership, regulatory governance, and academic research — extracted from 900 published doctrines and 241 specialist papers.
Technical Skills
SIEM · Detection · SOC
Microsoft SentinelSplunkArcSight ESMQRadarLogRhythmRSA EnvisionSOARKQLSPLSIEM ArchitectureLog AnalysisLog ManagementSecurity AnalyticsUser Behaviour Analytics (UBA)Threat DetectionThreat HuntingThreat Intelligence Azure SentinelSOC OperationsChronicle (Google SecOps)ExabeamSecuronix UEBATines SOARAnomaliMandiantCREST CISRSIM3 (SOC Maturity)FIRST Services FrameworkElastic SIEMSOC-CMM Maturity ModelThreat Intelligence IntegrationML-based Anomaly DetectionAlert Triage
IAM · PAM · Zero Trust
CyberArk PAMIdentity & Access Management (IAM)OktaAzure AD / EntraActive DirectoryPing IdentityPrivileged Access ManagementMFASSO · SAML · OAuthLDAPIdentity LifecycleZero TrustAzure PIM / JIT BeyondTrustOAuth 2.0 / OIDCSailPointSaviyntZero Trust ArchitectureUser Lifecycle Governance
Cloud Security
AzureAWSGCPAzure DefenderCloud Security ArchitectureCSPMContainer SecurityKubernetesDockerTerraformAnsibleJenkinsDevSecOpsInfrastructure as Code (IaC)ZscalerAkamai CDN AWS GuardDutyAWS Security HubCWPPGoogle Cloud (GCP)
Network & Perimeter Security
Checkpoint CCSEPalo Alto NetworksCisco ASA / CCNAJuniper JNCIS-FWVFortinetSkybox SecurityFirewall ManagementIDS / IPSWAFVPN · IPSec · SSLDDoS MitigationF5 BIG-IPProxy (Bluecoat · Zscaler · Websense)TCP/IP · BGP · OSPFVLANPKI AkamaiCheck PointFortinet / FortiGateNetskopeRadwareCloudflare
Endpoint · EDR · DLP
CrowdStrikeMicrosoft Defender (MDE)SentinelOneCarbon BlackMcAfee EPOSymantecEndpoint Detection & Response (EDR)Data Loss Prevention (DLP)Mobile Device Management (MDM)BYOD SecurityAnti-Malware DLPEDRCharlotte AI (CrowdStrike)TaniumCortex XDR
Frameworks · Compliance · Governance
NIST CSFISO 27001MITRE ATT&CKNCSC CAFECAF (Ofgem)UK NIS RegulationsDORANIS2GDPR · UK GDPRPCI DSSSOX · SAS 70SARA · SPRINT · IRAMCOBITITILOWASPCIS ControlsGovAssureSOC 2 Type 2Archer eGRC ISO 42001SABSAThird-Party Risk ManagementTOGAFADHICS (UAE)UAE PDPLOCCISO 27035NIST SP 800-61OCTAVEFS-ISAC
Vulnerability & Penetration Testing
QualysTenable NessusFoundstoneBurp Suite ProNmapWiresharkVulnerability ManagementPenetration TestingThreat ModellingAttack Surface ManagementRapid7 InsightVMOpenVASEPSSKEV CatalogueQualys VMDRTenable Lumin
Scripting · Automation · AI
PythonTerraformAnsiblePowerShellKQLSQLJavaScriptTypeScriptReactFastAPIPydanticAzure OpenAI / GPT-4oSemantic KernelLangChainAI Security Architecture
Agentic AI · LLM · AI Security
Agentic AI SecurityLLM Security & Red-TeamingAI Governance ArchitectureAI Pipeline EngineeringAI Risk GovernanceRAG ArchitectureAzure OpenAI / GPT-4oMLSecOpsAdversarial AI DetectionKnowledge Graph / HyperedgeResponsible AI & AI Ethics
Post-Quantum · Cryptography
Post-Quantum Cryptography (PQC)Quantum-Proof Identity ArchitectureCryptographic AgilityKey Management Infrastructure
Offensive Security · Red / Purple Team
Red Team OperationsPurple Team MethodologyTIBER-EU / DORA TLPTAdversary SimulationExploit Development & Zero-Day ResearchAPI Security Testing (REST / GraphQL / gRPC)Cloud & Container Penetration TestingInfrastructure & Active Directory Penetration TestingContinuous Security ValidationBreach & Attack Simulation (BAS)
Identity Governance · Advanced IAM
Saviynt IGAIdentity Governance & Administration (IGA)Just-In-Time (JIT) AccessZero-Standing Privilege (ZSP)RBAC / ABAC Policy EngineeringJoiner-Mover-Leaver (JML) AutomationNon-Human Identity GovernanceMachine Identity ManagementAntifragile Identity Architecture
OT · Aviation · Critical Infrastructure
OT / IT Convergence SecurityAviation Network SecuritySCADA / ICS SecurityAirside / Landside SegregationZero Trust for OT EnvironmentsPhysical-Cyber ConvergenceHigh Availability & DR Engineering (sub-second failover)
Network Architecture · Advanced
Cisco ACI (Micro-Segmentation)Citrix NetScaler (WAF / SSL Offload)Network Segmentation DesignDetection EngineeringBGP / OSPF RoutingSD-WAN Architecture
Cloud Governance · Sovereign Cloud
Microsoft MCRAAzure Landing ZonesCloud-Native SecurityCloud Governance at ScaleSovereign Cloud StrategyData Residency & SovereigntySaudi NCA / ECC ComplianceMulti-Jurisdictional Cloud Compliance
Product Security · Supply Chain
Product Security (CRA / NIS2)SBOM ManagementSecure-by-Design EngineeringSupply Chain Risk ManagementInstitutionalising Product SecurityFiduciary Cyber Liability Management
Scripting · APIs · Integration
REST API DevelopmentGraphQLgRPCPython AutomationInfrastructure-as-Code (IaC) SecurityCI/CD Security PipelineSOAR Playbook EngineeringWebSocket / SSE Streaming
Enterprise Architecture · Integration Patterns
Domain-Driven Design (DDD)Event-Driven ArchitectureKafkaAWS EventBridge / SNS / SQSAzure Service Bus / Event Grid / Event HubsMuleSoftAzure Logic AppsOpenAPI / AsyncAPIApigeeKong API GatewayAzure APIMAWS API GatewaySaga PatternsArchitecture Decision Records (ADRs)C4 ModelAzure BicepAWS CloudFormationAKS / EKS / GKE
Risk Quantification · GRC Advanced
FAIR Risk QuantificationEU AI Act ComplianceGDPR / UK GDPR ImplementationCRA (Cyber Resilience Act)TIBER-EU FrameworkRegulatory Gap AnalysisMulti-Framework GRC Integration
Enterprise IAM · PAM Platform Stack
SailPoint IdentityIQSailPoint IdentityNowCyberArk ConjurBeyondTrust PAMThycotic / DelineaForgeRockOracle Identity Manager (OIM)HashiCorp VaultBroadcom CA SiteMinderDuo · RSA SecurID · YubiKeyAccess Certification CampaignsRole Mining & RBAC DesignSOD Conflict Detection
SIEM · SOAR · NDR Platform Ecosystem
Splunk ESLogPointCortex XSOARPhantom / DemistoMISPThreatConnectRecorded FutureDarktrace NDRVectra NDRExtraHopSnort / SuricataCisco Firepower
AppSec · DevSecOps Toolchain
Checkmarx SASTSonarQubeMicro Focus FortifyOWASP ZAPSnyk SCABlack DuckAqua · Twistlock · TrivyPrisma CloudTerraform Sentinel · CheckovSTRIDE / PASTA Threat ModellingShift-Left Security PracticesSecurity Champions Programme API SecurityCI/CD SecurityDASTSASTSCAThreat ModelingSemgrepCodeQLVeracodeOWASP ASVSOWASP SAMM 2.0OWASP API Top 10CycloneDX SBOMSPDXtfsecTerrascanBSIMM
OT/ICS · Industrial Control Security
ClarotyNozomi NetworksDragosTenable OTIEC 62443Industrial Protocol SecurityOT Asset Discovery & Inventory
Data Governance · Privacy Engineering
Symantec DLPForcepoint DLPBoldon James ClassificationTitus ClassificationOneTrustTrustArcBigIDAWS Macie · Azure PurviewDPIA DeliveryRecords of Processing Activities Data SovereigntyKey Management (HSM / KMS)
Generative AI · LLM · Agentic Stack
Azure AI FoundryAzure AI Document IntelligenceAzure AI SpeechAzure AI SearchAzure AI TranslatorAWS BedrockGCP Vertex AIGoogle Gemini APIVertex AI Agent Development KitChatGPT EnterpriseClaude Enterprise (Anthropic)Microsoft Copilot StudioSalesforce AgentforceSalesforce EinsteinLangGraphLlamaIndexAutoGenCrewAIMulti-Agent A2A OrchestrationPinecone Vector DBWeaviateChromaDBpgvector
GPU Infrastructure · AI Data Centre
NVIDIA DGX / HGXNVIDIA MetropolisNVIDIA OmniverseNVIDIA CUDAInfiniBand FabricRoCE v2OpenUSDGPU Cluster ArchitectureHigh-Performance ComputingEdge AI Deployment
MLOps · AI Platform Engineering
Azure Machine LearningAWS SageMakerDatabricks LakehouseDelta LakeSynapse AnalyticsBigQuery MLMLflowKubeflowPyTorchTensorFlowONNX RuntimeSHAP / LIME ExplainabilityModel Drift MonitoringFeature Store Engineering
AI Security · Responsible AI
Prompt Injection DefenceAI Red TeamingOWASP Top 10 for LLMGuardrails AINIST AI RMFISO 42001 AI Management AI GovernanceAI SecurityAutomation / Orchestration
DevOps Automation · Modern Productivity
Power Automaten8n Workflow AutomationZapierGitHub ActionsAzure DevOps PipelinesHelmGitOps / ArgoCD
Zero Trust · Modern Access
Conditional AccessPrisma Access SASE
Regulatory Frameworks & Standards
NIS2 Transposition AnalysisDORA Supervisory ReviewDORA Article 28 OversightEU AI Act Article 6 AssessmentEU AI Act High-Risk RegistryCRA Vulnerability ReportingUK Cyber Security & Resilience BillData (Use and Access) Act 2025Online Safety Act CompliancePSTI Act EnforcementAI Safety Institute EngagementDigital Services ActDigital Markets Act
International Standards Portfolio
ISO 27001:2022 TransitionISO 27005:2022 Risk ManagementISO 27017 Cloud SecurityISO 27018 PII ProcessingISO 27701 PrivacyISO 22301 BCMSISO 31000 RiskISO 9001 QMSNIST CSF 2.0NIST 800-53 Rev 5NIST 800-171COBIT 2019COSO ERMITIL v4TOGAF 10SABSA Enterprise Security Architecture COBIT 5 / 2019
Threat-Led Testing & Assurance
TLPT Threat-Led PenetrationCBESTSTAR-FSiCASTMITRE D3FENDSLSA Frameworkin-toto Attestations
Policy-as-Code & Continuous Compliance
Policy as Code (OPA / Rego)Regulation as CodeControl Mapping AutomationContinuous Control MonitoringEvidence Chain Management
Institutional Doctrine Concepts
Board-Survivable Cyber ArchitectureAudit-Proof by DesignLitigation-Grade SecurityDefensible CISO DoctrineSovereign CISO DoctrineSovereign AI FrameworkIdentity Control PlaneIdentity Hegemony DoctrineIdentity Moat ArchitectureTrust Architecture DoctrineInstitutional Cyber Doctrine
Detection & Response Stack
NDR — Network Detection & ResponseXDR — Extended Detection & ResponseMDR — Managed Detection & ResponseSSE — Security Service EdgeDetection EngineeringDetection as CodeSigma RulesYARA RulesDeception TechnologyThreat Hunting Programme Incident ResponsePlaybook Development
Cloud Security Posture Stack
CSPM — Cloud Security Posture ManagementCWPP — Cloud Workload ProtectionCIEM — Cloud Infrastructure Entitlement MgmtCNAPP — Cloud-Native App ProtectionDSPM — Data Security Posture ManagementSSPM — SaaS Security Posture Management
Microsoft Defender & EDR Ecosystem
Defender for CloudDefender for EndpointDefender for IdentityDefender for Office 365CrowdStrike FalconSentinelOne
Passwordless & Modern Authentication
PasskeysFIDO2WebAuthnPasswordless AuthenticationMFA Fatigue ResistanceBreak-Glass Access ProceduresTier 0 Asset Protection
Advanced Cryptography & Confidential Compute
Homomorphic EncryptionConfidential ComputingSecure EnclavesZero-Knowledge ProofsHSM — Hardware Security ModulesKey Management (BYOK / HYOK)Crypto Agility
Service Mesh & Cloud-Native Security
IstioEnvoy ProxyLinkerdSPIFFE / SPIRE Workload IdentityOpen Policy Agent (OPA)Falco Runtime SecurityWiz Cloud SecuritySnykAqua Security
Observability Stack
PrometheusGrafanaOpenTelemetryElastic Stack / OpenSearchDatadogDynatrace
Business & Leadership Skills
Strategic PlanningEnterprise ArchitectureGovernance & ComplianceRisk ManagementRisk AssessmentRisk MitigationRegulatory ComplianceSecurity AuditIT AuditSolutions ArchitectureProject ManagementProgramme DeliveryChange ManagementStakeholder ManagementBudget Management ($20M+)Business Continuity (BCP)Disaster Recovery (DRP)Incident ManagementVendor ManagementContract NegotiationConsultingBusiness AnalysisDigital TransformationAgile · Prince2 · WaterfallIT Service ManagementConfiguration ManagementFramework DevelopmentSecurity Awareness TrainingBoard-Level ReportingExecutive Stakeholder Engagement
CISO Leadership · Executive Delivery
Interim CISO (Delivery-Focussed)CISO AdvisorySecurity Transformation (Cost Centre → Trust Officer)Crisis Command & Zero-Hour Protocol90-Day Board Confidence RoadmapBoard-Level Liability Management Board ReportingCISO StrategySecurity ArchitectureExecutive Reporting
Financial & Legal Services
M&A Cyber Due DiligencePE Portfolio Cyber Risk AssessmentExpert Witness (Legal & Regulatory)FAIR-AIR Risk QuantificationCyber Insurance AdvisoryRegulatory Enforcement ResponseSovereign Banking Security Architecture Big 4 Consulting
Regulatory Programme Delivery
Cross-Jurisdictional Regulatory ExpertiseDORA Programme DeliveryNIS2 Implementation ProgrammeFCA PS21/3 Operational ResiliencePRA SS1/21 Operational ResilienceEU AI Act Readiness AssessmentRegulatory Audit SupportCompliance-to-Competitive Advantage Strategy
Chartered Certifications & Standards
CISSPCISMCRISCCCSPISO 27001 Lead AuditorSABSA Chartered Security ArchitectTOGAF 9 CertifiedCyberArk CDEAWS Certified Security – SpecialtyMicrosoft SC-100 Cybersecurity ArchitectMicrosoft SC-200 Security Operations AnalystAZ-305 Azure Solutions Architect ExpertCisco CCNA SecurityAzure Security Engineer AssociateGoogle Cloud Professional Cloud Security EngineerGoogle Professional Cloud ArchitectAWS Certified Solutions Architect – ProfessionalAWS Certified AI PractitionerHashiCorp Terraform AssociateCKA – Certified Kubernetes AdministratorGIAC GSTRTCREST CCIM (Certified Incident Manager)CCA (Cybersecurity Architecture) TOGAF 9
Extended Regulatory & Sector Compliance
HIPAAGLBAPCI-DSS v4.0SOC 2 Type 2Basel II / III (BCBS)
Advanced Certifications (Extensions)
ISO 27001 Lead ImplementerBSI / IRCA CertifiedCCSKCSA STAR
Supervisory Authorities & Regulators
ICO (UK)DPC (Ireland)OfcomComRegCCPCEBAESMAEIOPAECBENISADSIT (UK)OPSS (UK)HM TreasuryCentral Bank of Ireland FCAPRA
Governance & Risk Programmes
Third-Party Risk Management (TPRM)ICT Third-Party OversightDigital Operational ResilienceRegulatory Horizon ScanningMulti-Jurisdictional ComplianceCross-Border Data FlowsRegulatory Remediation ProgrammeBoard Cyber ReportingAudit Committee ReportingRisk Appetite StatementRegulatory Change ManagementPolicy Harmonisation
GRC Platform Expertise
ServiceNow GRCMetricStreamLogicGate
AI Governance & Assurance
AI Conformity AssessmentAI Impact AssessmentAI Bill of Materials (AIBOM)AI Incident RegisterAgentic AI GovernanceAI Pilot Governance Framework
Incident Reporting Obligations
4-Hour DORA Incident Reporting24-Hour NIS2 Early Warning72-Hour GDPR Breach NotificationRegulatory Reporting AutomationSignificant Incident Classification
Privacy & Cross-Border Transfers
ROPA Records of ProcessingSchrems II / TIAStandard Contractual Clauses (SCC)Binding Corporate Rules (BCR)EU-US Data Privacy Framework
MENA & Sovereign Regulatory Frameworks
Saudi NCA ECCSaudi NCA CAFSaudi SAMA CSFSaudi PDPLUAE NESAUAE IA StandardQatar NIAKuwait NCABahrain NCSC
US Data Security Rule · DOJ EO 14117
DOJ 28 CFR Part 202Executive Order 14117Bulk US Sensitive Personal DataGovernment-Related DataCountries of Concern ScreeningProhibited & Restricted TransactionsCISA Security RequirementsAnnual NSD ReportsDOJ Licensing & Advisory OpinionsBulk Data Threshold TrackingHuman 'Omic Data Governance
Pharma R&D · Clinical Data Protection
HIPAA Privacy & Security RulesHITECH Breach Notification21 CFR Part 11GCP / ICH E6(R2)EU Clinical Trials Regulation (CTR)EMA Policy 0070FDA Software-as-Medical-Device (SaMD)GxP-Validated AIIRB / Ethics Board LiaisonClinical Data SovereigntyHonest-Broker / Custodian ModelsFederated Learning & Secure EnclavesCRO / Processor Due DiligenceInvestigator-Site AgreementsPharmacovigilance Data GovernanceReal-World Evidence PlatformsGenomic & Biomarker Data Controls
Extended Privacy Regulations (Global)
LGPD (Brazil)PDPA (Singapore)PIPEDA (Canada)POPIA (South Africa)CCPA / CPRACPA (Colorado)CTDPA (Connecticut)VCDPA (Virginia)UK DPA 2018Article 9 Special-Category DataArticle 35 DPIA MethodologyArticle 30 ROPAArticle 49 Derogations
Cross-Border Data Transfer Mechanisms
SCCs 2021/914 (Modular)Binding Corporate Rules (BCR)UK IDTA & AddendumUK–US Data BridgeEU–US Data Privacy FrameworkSchrems II Transfer Impact AssessmentDOJ EO 14117 Transfer ScreeningData Residency by DesignCRO / Lab Data ResidencyVendor Flow-Down Clauses
Cloud Data Protection (Extended)
AWS MacieAWS KMSAWS Lake FormationGCP DLP APIGCP VPC Service Controls (VPC-SC)Azure Defender for CloudMicrosoft Purview Information ProtectionCustomer-Managed Keys (CMK)Confidential ComputingTokenisationPseudonymisation & k-AnonymityDifferential Privacy
Pharma & Life Sciences Tooling
Veeva VaultMedidata RaveeCOA / ePRO PlatformsElectronic Trial Master File (eTMF)Power BI (Clinical Reporting)ServiceNow GRC / IRMOneTrustWorkivaCollibraVaronisBigIDDAMA-DMBOK
Operational Resilience · Regulatory Specifics
FCA/PRA PS21/3Important Business Services MappingImpact TolerancesSevere-but-Plausible Scenario TestingSupply Chain ResilienceAnnual NIS Self-Assessment AuthorshipNCSC GuidanceBEIS / DSIT Regulatory FrameworkOfgem Cyber ExpectationsDORA Chapter V (ICT Third-Party)FCA SYSC 8EU–US Clinical Data Flow Governance
Business & Leadership
CIO / CRO AdvisoryBoard & Audit Committee EngagementP&L ManagementBudget Planning (£20M+ Programmes)Contract NegotiationMulti-Vendor GovernanceBig 4 Risk Advisory DeliveryM&A Cyber Due Diligence (50+)Three Lines of Defence (3LoD)FAIR Risk QuantificationKRI Library Authorship (250+)Policy Harmonisation (70+)Regulator Liaison (FCA · PRA · CBI · ECB)SteerCo & Executive ReportingConsulting Craft & Gravitas
Professional Attributes · Extended
Outside IR35 · UK Limited CompanyB2B Day-Rate Contractor100% Remote CapableEuropean Working Hours (CET/CEST/GMT/BST)Immediate Availability · Day-1 ProductiveBritish & EU (Irish) Dual CitizenshipEnglish (Native · C2)Circle of Excellence (KPMG)High Flyers (EY)Super Coach (PwC France)University Gold Medallist (BEng)
Personal & Professional Attributes
Executive PresenceLeadershipStakeholder EngagementCommunicationWritten CommunicationCollaborationInnovationIntegrityResilienceDriveOrganisation
Sector & Domain Expertise
Critical National Infrastructure (CNI)Aviation Sector (Airside / ATC)Financial Services (21 yrs)Government & Public Sector AIHealthcare & Regulated EnvironmentsLegal / Judicial Sector
Academic & Thought Leadership
Academic Research & Publication (900 papers)Doctrine Writing & Framework DesignProfessor of Practice (Schiphol University)Honorary Senior Lecturer (Imperials)Big 4 Consulting (Deloitte · PwC · EY · KPMG)Keynote & Board Presentation Professor (Schiphol University)
Professional Memberships & Industry Awards
Lead Auditor, Information Security Forum (ISF)Platinum Member, ISACA London ChapterGold Member, (ISC)² London ChapterProgramme Lead, PRMIA Cyber SecurityMember, Cyber Defence TaskforceResearcher, University College London (UCL)Excellence in Education Award — Imperial CollegeCircle of Excellence Award — KPMGHigh Flyers Award — Ernst & YoungSuper Coach Award — PwC France Industry Award Recipient
Academic Distinctions & Clearances
MSc Information Security — UCLMBA Strategic Management & Technology LeadershipBEng University Gold MedallistHonorary Doctorate in LiteratureTop Teacher AwardBPSS EligibleSC / DV Clearance EligibleUK Parliament Cyber Security Committee UK DV Clearance
SIEM · Detection · SOC
Elastic SIEMRSA Security AnalyticsCORR EngineSigma Rule ConversionSentinel Analytics RulesSentinel Content HubAzure MonitorLog Analytics WorkspaceData Collection Rule (DCR)Azure Monitor Agent (AMA)CEF · Syslog · Event HubCopilot for SecuritySOC-CMM MaturityKQL WorkbooksArcSight LoggerArcSight Flex ConnectorSplunk Enterprise SecurityExabeam UEBASecuronix UEBAMITRE ATT&CK for ICS
IAM · PAM · Zero Trust
Okta IdPPingFederatePingAccessMicrosoft Identity Manager (MIM)Omada IdentityOne Identity ManagerNetIQ Identity ManagerSCIM 2.0WS-FederationADFSAD ConnectPassword Hash SyncPass-Through AuthenticationSeamless SSOEntra ID Entitlement ManagementEntra ID Access ReviewsWorkload IdentitiesEntra ID B2B / B2CEntra ID Identity ProtectionNIST SP 800-207 Zero TrustNIST SP 800-63 Digital IdentityKerberosRADIUSTACACS+Microsoft SC-300ZTNA (Zscaler ZPA · Netskope · Cloudflare Access)
Cloud Security
AWS Control TowerAzure Defender for CloudAzure Conditional AccessAzure Key VaultAzure PolicyGCP Security Command CentreGCP BeyondCorpCloud KMSCloud HSM
Network · Perimeter · Segmentation
Check Point R80 / R81Cisco PIXJuniper SRX · NetscreenIronPortIllumio Micro-SegmentationGuardicoreArbor Peakflow DDoSAkamai Kona / Site ShieldCisco ACI Micro-SegmentationOPC UAEtherNet/IPIEC 61850Deep Packet Inspection (DPI)Wireshark / tsharkSD-WAN
Endpoint · EDR · DLP
CrowdStrike Falcon XPalo Alto Cortex XDRMicrosoft Defender XDRMicrosoft Defender for EndpointMcAfee FoundstoneFireEyeCylanceTripwire Integrity MonitoringCIS BenchmarksWSUS Patch Management
OT · ICS · Industrial
Siemens S7Rockwell Allen-BradleySchneider PLCHoneywellYokogawaDCS · PLC · HMI · RTUModbus (RTU/TCP)ProfinetDNP3CANbusSafety-Instrumented Systems (SIS)Hardware-in-the-Loop TestingFactory Acceptance Testing (FAT)Site Acceptance Testing (SAT)NCSC CAF for OTNIST SP 800-82Zone & Conduit ModellingPurdue Reference ModelClaroty xDomeDragos PlatformArmisTenable OT Security
Threat Intelligence · CTI
Mandiant AdvantageMicrosoft Defender TIFlashpointIntel 471CrowdStrike IntelOpenCTIAnomaliSTIX / TAXIIDiamond ModelCyber Kill ChainAPT Tracking (FIN7 · Cobalt · TA505 · Lazarus)CISA KEVEPSS Exploit PredictionIOC ManagementStrategic Threat Reporting
Vulnerability · Exploit · Red Team
Qualys VMDRTenable.io / SCRapid7 InsightVMCVSS v3.1 / v4.0Tenable Nessus ProfessionalBurp Suite ProfessionalDbProtectHardware Vulnerability ResearchReverse Engineering & DebuggingExploit Development MindsetFuzzing
Frameworks · Compliance · GRC
ITSRM MethodologyPM²/OpenPM²Prince2 PractitionerPMI PMPRCSA — Risk & Control Self-AssessmentRisk Treatment PlansResidual Risk StatementsEvidence Pack ProductionControl MappingMandatory AttestationEBA/ECB/CBI/FCA/PRA EngagementTOGAF 9 ADMArchiMate 3.x ModellingThree Lines of DefenceBureau Veritas ISO 27001 Lead AuditorISO 24760 Identity ManagementSTRIDE · PASTA · LINDDUN Threat ModellingAttack Tree AnalysisISO 42001 AI Management SystemDORA ICT Risk & Incident ManagementNIS2 Directive Compliance
DFIR · Forensics · Incident Response
EnCase ForensicFTKVolatility FrameworkVelociraptorKAPEMemory ForensicsDisk ImagingChain of CustodyEvidence PreservationMalware AnalysisReverse Engineering FundamentalsIncident ReconstructionMajor Incident ManagementCSIRT LeadershipCrisis CoordinationContainment & EradicationIncident OrchestrationForensic Triage
AI · Azure AI Platform
Azure AI Search (Vector + Hybrid)Azure AI VisionAzure AI LanguageAzure OpenAI (GPT-4o · GPT-4 Turbo · o-series)DALL-E 3SoraStable DiffusionAdobe Firefly ServicesMidjourneyRunway Gen-3Pika LabsElevenLabsAzure AI Content Safety
AI · Agent Frameworks & SDKs
FastAPILangChain.jsOpenAI SDKAnthropic SDKNestJSNext.jsVercel AI SDKRetrieval-Augmented Generation (RAG)RAGAS EvaluationPhoenix LLM EvaluationOpenTelemetry for LLMWhisper (Speech Transcription)FAISSBM25 Keyword SearchDeepEvalCross-Encoder Re-rankingSentence-TransformersHybrid Search (Vector + Keyword)
AI · MLOps · Data Platforms
Azure MLService BusEvent GridEvent HubsKafkaAKSAzure Container AppsAzure FunctionsAzure Data FactoryAzure SynapseMicrosoft Fabric / OneLakeDatabricks on AzureCosmos DBArgo CD
Content · Marketing Operations
Adobe Experience Manager (AEM)Adobe WorkfrontVeeva PromoMatsVeeva MedCommsBynder DAMAprimo DAMBrandfolderPharma MLR Workflows
DevSecOps · IaC · Policy
BicepGitLab CIOpen Policy Agent (OPA / Rego)Terraform SentinelCheckovSAST · DAST · SCAFortify · Coverity · Klocwork
Cryptography · PKI · Keys
HSM Integration (Thales · Entrust nShield)Certificate Authority DesignCertificate Lifecycle AutomationKMIP Key ManagementAES / RSA / ECDSATLS 1.3IPsec / IKEv2S/MIME · Code SigningBYOK · HYOK
Regulatory & Governance (Extended)
OCCSOXSAS70NATO STANAG 6001 English L4NCIA Architecture MethodologyJSP 440 · JSP 604HMG Security ClassificationsRMADS
Emerging · Disruptive Technology
AI/ML SecurityAdversarial AIQuantum-Safe Cryptography (NIST PQC)LLM Supply-Chain SecurityModel Supply-Chain SecurityThreat Modelling for ML SystemsGenerative-AI Misuse Mitigation
Pharma · Life Sciences · Clinical Data Security
21 CFR Part 1128 CFR Part 202DOJ Executive Order 14117EU Clinical Trials Regulation (CTR)GCP / ICH E6(R2)HITECH ActMedidata RaveMicrosoft PurviewVeeva Vault
Operational Risk · Capital Adequacy
ICAAPILAAPISAE 3402 SOC ReportsKRI / KCI / KPI FrameworkNIST SP 800-30 Risk AssessmentProcessUnity TPRMScenario Analysis & Stress TestingServiceNow IRMSolvency II Pillar 2
Risk Reporting · Board Analytics
Power BITableau
Check Point Advanced · Network Security Enterprise
Cato SASECheck Point MDSMCheck Point MaestroCheck Point QuantumCheck Point VSXCisco Firepower Threat Defense (FTD)FortiWeb WAFImperva WAFModSecurityPalo Alto PAN-OS 10 / 11Palo Alto PanoramaZscaler Digital Experience (ZDX)
Virtualisation · End-User Computing
Azure Virtual Desktop (AVD)Citrix Virtual Apps & Desktops (VAD)Microsoft Endpoint Manager (SCCM / MECM)Microsoft IntuneNutanix AHVVMware HorizonVMware vSphere / NSX
Campus · Wireless · NAC · Unified Comms
Aruba ClearPass NACAudioCodes SBCCisco Identity Services Engine (ISE)Cisco MerakiCisco Unified Communications Manager (CUCM)Microsoft Teams PhoneMist AI (Juniper)Ribbon Session Border Controller
Managed Print · Enterprise Services
HP Web JetadminPaperCutuniFLOW
CyberArk Portfolio (Full-Stack PAM)
CyberArk AIM / AAMCyberArk Central Policy Manager (CPM)CyberArk Conjur Secrets ManagerCyberArk Defender · Sentry · GuardianCyberArk DNACyberArk Endpoint Privilege Manager (EPM)CyberArk Password VaultCyberArk Privilege CloudCyberArk Privileged Session Manager (PSM)CyberArk Privileged Threat Analytics (PTA)Microsoft LAPS
Financial Services Regulators (Global)
BaFin (Germany)Bank of England (BoE)CSSF (Luxembourg)Hong Kong Monetary Authority (HKMA)Monetary Authority of Singapore (MAS)NYDFS Part 500
Supply Chain · Third-Party Cyber Assurance
BitSightISO 27036 Supplier SecurityMITRE ATLAS (Adversarial ML)NIST SP 800-161 C-SCRMSBOM — CycloneDXSBOM — SPDXSecurityScorecardShared Assessments SIG / SCA
Offensive Assurance · Certifications
CREST Certified TestingCyber Essentials PlusITIL 4 Managing Professional
AI Security & Governance (Extended)
CAM for AI AttestationEU AI Act ComplianceISO/IEC 42001 (AI Management)OWASP LLM Top 10SAP BTP AI FoundationSchrems II Data Transfer Controls
Workload Identity & Passwordless Authentication
Delinea Secret ServerFIDO2SPIFFE / SPIREWebAuthn
IaC Security · Policy Engines (Extended)
OPA GatekeeperTerratesttfsec
Microsoft Security Certifications
AZ-104 Azure AdministratorAZ-305 Azure Solutions Architect ExpertAZ-500 Azure Security EngineerSC-100 Cybersecurity Architect ExpertSC-200 Security Operations AnalystSC-300 Identity & Access Administrator
Kubernetes & Container Platform Security
CKA — Certified Kubernetes AdministratorCKS — Certified Kubernetes Security SpecialistGitHub Actions OIDC FederationGitHub Advanced SecurityNIST SP 800-190 Container Security
Edge Protection · WAF Engineering (Extended)
Azure Front Door PremiumOWASP CRS 3.2
OT/ICS Security Platforms
ArmisCisco Cyber VisionClaroty CTDDragos PlatformForescoutMicrosoft Defender for IoTNozomi Networks GuardianTenable.ot
Industrial Protocols · Historians · HMI
BACnetCitect SCADADNP3FactoryTalk (Rockwell)GE iFIXHART-IPIEC 61850Modbus / Modbus TCPOPC UAOSIsoft PI SystemPROFINETSiemens WinCC
Vulnerability Intelligence · Prioritisation
CISA KEV CatalogCVSS v4.0EPSS — Exploit Prediction ScoringNIST SP 800-82 Rev.3 (ICS Security)
Data-Diode · Cross-Domain Solutions
Owl Cyber DefenseWaterfall Security Solutions
UK CNI Sector Regulators (Water · Energy)
DWI — Drinking Water InspectorateNERC CIP (North America)Ofwat Cyber Resilience Code
Heritage Network & Perimeter Platforms
Crossbeam X-SeriesNokia IP Appliance FirewallsCisco CS-MARSTippingPoint IPSAlgoSec Firewall AnalyzerCisco Guard Anti-DDoSMU DynamicsAlteon Load BalancerClearswift MIMEsweeperMail SweeperFirewall Services Module (FWSM)Cisco Security Manager (CSM)Cisco ACS
Heritage Encryption & Endpoint Control
PGPMcAfee Safeboot Endpoint EncryptionPointsec Disk EncryptionReflex DiskNet ProSmartline DeviceLock3DNS Load BalancingCisco VPN ConcentratorDigital WatermarkingSteganographyCrypto-Analysis
Historic Legal · Regulatory Doctrine
UK Computer Misuse ActUK Data Protection Act 2018Safe Harbor FrameworkHMG Information Assurance StandardsCRB Enhanced ChecksMOD Basic Vetting
AppSec · Source Code Scanners (Legacy Heritage)
Cenzic HailstormSPI Dynamics WebInspectWatchfire AppScanWhiskerOunce LabsCoverityKlocworkFindBugs / FxCopPrefix / PrefastFortify (Micro Focus)
Database Security Scanners (Legacy)
DbProtectAppDetectNGSS
Legacy Certifications & Training Lineage
ITIL Foundation CertifiedMCSE Windows 2000MCSE Windows NTCisco CCNPCisco CCNAArcSight Flex ConnectorArcSight Logger AdminCyberArk Privileged Identity Management SuiteCyberArk Privileged Session Management SuiteCyberArk Sensitive Information Management SuiteISS SafeSuite / Internet ScannerSymantec Intrusion Detection (Enterprise)Fortinet FortiGate Administrator (France)
Academic Heritage — Degrees & Institutions
MBA-IT — Andhra UniversityBEng Electronics — Osmania UniversityDiploma in Electronics — Govt. InstituteMSc Information Security (UK)University Gold Medallist
Big 4 & Consulting Lineage (Resume Refresh)
Big 4 Cyber AdvisoryDeloitte Risk AdvisoryPwC Cybersecurity & PrivacyEY Cybersecurity PracticeKPMG Cyber DefenseAccenture CyberKPMG Circle of ExcellenceEY High Flyers AwardPwC Super Coach AwardBig 4 Methodology Fluency
Regulatory Frameworks 2026 — Sector & Jurisdiction
DORA Readiness & ImplementationNIS2 Directive ComplianceFINMA Operational ResilienceADGM Cyber Risk Management FrameworkSAMA Cybersecurity FrameworkQCB Cybersecurity FrameworkCBB Cybersecurity FrameworkBank of England Operational ResilienceFCA Operational ResiliencePRA Operational ResilienceSolvency II CyberHIPAA Cyber ProgrammesLloyd’s Cyber InsurancePCI DSS 4.0ISO/IEC 42001 AI Management SystemISO 31000 Risk ManagementCritical Third-Party Providers (CTPP)ICT Third-Party RiskSaudi Vision 2030 Cyber
Governance Doctrine & Engagement Models
Evidence Chain ModelDecision Rights ArchitectureContract Control MatrixAI Accountability StackAI Control Plane ArchitectureCrisis Command RetainerVirtual CISO (vCISO)Chief AI Security Officer (CAISO)DORA Programme DirectorOperational Resilience LeadSecurity Transformation Programme LeadPrincipal Cyber ArchitectInstitutional Governance AuthorityOutside IR35 EngagementUK Limited Company Operating ModelIrish Limited Company Operating ModelStatus Determination Statement (SDS)Three-Lines-of-Defence Operating Model
AI Governance Architecture (2026)
AI Inventory & RegistryModel Risk GovernanceData Provenance ControlsBias & Explainability ControlsAI Pipeline Governance
Sector Programmes & Industry Coverage
Insurance Cyber ProgrammesReinsurance Cyber ProgrammesComposite Insurer ProgrammesLloyd’s Market Insurance CyberCapital Markets CyberPublic Sector CyberEnergy Sector CyberTelecoms Sector CyberM&A IT Risk Due Diligence
Vendor Heritage & Cloud Credentials (Resume Refresh)
AWS Certified Security — SpecialtyAzure Security Engineer AssociateGoogle Cloud Professional Cloud Security EngineerCCSE · CCSA · CCMSE (Check Point)MCSE — MicrosoftISS RealSecureISS Proventia IPSSourcefireArbor Networks PeakflowRadware DDoS MitigationIBM Security VerifyDatadog SIEMMicrosoft Defender XDRDbProtectMcAfee SafeBootPointsecS/MIMECertificate Lifecycle ManagementTACACS+EIGRPCisco Wireless
SOC Operations & KRI Libraries
KRI Library DesignITSM Risk LibrariesService Management RiskSOC L1/L2/L3 Escalation24/7 Detection OperationsMSSP GovernanceDark Web MonitoringBCM/DR TestingTechnology Risk ManagementGroup-Level IT Risk MethodologySLA/KPI DefinitionProvider Performance ManagementPlaybook DesignAutomated Alert Enrichment
Memberships & Professional Honours
Schiphol Honorary ProfessorUCL ResearcherISACA London Chapter — Platinum(ISC)² London Chapter — GoldISF Lead AuditorInstitute of Risk Management (IRM)PRMIA Programme Lead
AI Security · Agentic AI · MCP Controls (2026)
Agent Identity SeparationAI Red-Team Regression HarnessApproval Gates / Kill SwitchesBehavioural Drift MonitoringCanary PromptsCapability Allow-ListsENISA AI Threat LandscapeFunction-Calling SecurityHallucinated Dependency (Slopsquatting) DetectionIndirect Prompt Injection DefenceMCP (Model Context Protocol) SecurityMulti-Agent Audit TrailsNIST AI RMF Generative AI Profile (AI 600-1)OWASP Top 10 for Agentic AI (2025)OWASP Top 10 for LLMs (2025)Persistent Memory Poisoning DefenceResource-Scoped Tool BindingsSandboxed AI Execution
Hyperscaler AI · Foundation Model Platforms
Anthropic Claude APIAWS BedrockAWS SageMakerAzure OpenAI · AI FoundryGoogle Vertex AIOpenAI API & AssistantsSAP Business AISAP Cloud Identity ServicesSAP IAS / IPS
AI Lifecycle Identity · CAM for AI
AI Access Provisioning WorkflowsAI Audit Evidence MapsAI Entitlement CatalogueAI Tool ConnectorsCloud Access Manager (CAM) for AIFeature Store SecurityInference Gateway AuthenticationInstance-Level Access BoundariesModel Lifecycle IAMModel Supply-Chain AttestationRAG Pipeline SecurityTraining Data Access ControlsVector Database Security
AI-First SSDLC · Threat Modelling (Extended)
Attack Tree CataloguesBow-Tie AnalysisBSIMM for AIIriusRiskMicrosoft Threat Modelling ToolNIST SSDF (SP 800-218)OWASP SAMM 2.0OWASP Threat DragonSecure AI Development Lifecycle (SAIDL)Threat-Model-as-CodeTrike Threat Modelling
Workload Identity Federation (Extended 2026)
AWS IRSA (IAM Roles for Service Accounts)Azure Managed IdentitiesCertificate-Based AuthenticationGCP Workload Identity FederationPhishing-Resistant MFASAP BTP Service InstancesService-Mesh Identity PropagationShort-Lived CredentialsToken-Based Integration
Identity Control Plane · Federation Doctrine
Active-Active Federation (Zero Regional Dependency)Adaptive Risk-Based MFABeyond RBAC / Attribute-Driven AuthorisationContinuous Identity AssuranceEvent-Driven Identity (SCIM-Driven)FAPI-Compliant OAuth 2.0Federation-First ModernisationIdentity Control Plane DoctrineJust-in-Time (JIT) PrivilegeMachine Identity at ScalemTLS as Identity (East-West Trust)Post-Merger Identity ConsolidationReal-Time Federation RoutingToken Issuance PipelinesZero Standing PrivilegeZero-Secret Architectures
AI-Enhanced Incident Operations (2026)
5-Whys / Fault-Tree AnalysisAI-Assisted Runbook ExecutionAtlassian StatuspageBlameless Post-Incident ReviewCrowdStrike Charlotte AIDynatrace Davis AIMicrosoft Sentinel AI · Copilot for SecurityMTTD / MTTR ProgrammeOpsgeniePagerDutyServiceNow MIM ModuleSOAR — Cortex XSOAR · Splunk SOARSplunk AI · Observability CloudTabletop & Live Crisis ExercisesxMatters On-Call
AppSec Toolchain (Extended 2026)
Black DuckBurp Suite EnterpriseCheckmarxCodeQLContrast IASTDependency-TrackInvictiOWASP ZAPPR Policy GatesPre-Commit Hooks (husky · pre-commit)SBOM CycloneDX / SPDXSeeker IASTSemgrepSigned CommitsSigstore Cosign SigningSLSA Build Attestation (Levels 1–4)Snyk Code · Snyk ContainerSonarQubeVeracode
Container & K8s Security (Extended 2026)
AnchoreAqua Container SecurityClairCosign Signed ImagesFalco Runtime SecurityKyvernoPod Security StandardsService Mesh — Istio · Linkerd · EnvoySnyk ContainerSysdig SecureTrivy
Sovereign Data · Cross-Border Doctrine (Extended)
14400-Second (4-Hour) DORA Compliance Doctrine36-Hour Compliance Velocity FrameworkClinical Data SovereigntyDaubert / FRE 702 AI Evidence DoctrineDOJ 28 CFR 202 Sovereign Data DoctrineEO 14117 Bulk Sensitive Personal DataSchrems II Transfer Impact AssessmentSovereign Doctrine Series (AEGIS · ATLAS · BRIDGE · NEXUS · TRIAGE · DECIDE · FORGE · ORACLE · VELOCITY · SENTINEL · PRISM · COMPASS · AEON)