Personal Information
Organization / Workplace
London, United Kingdom United Kingdom
Occupation
Security Architect
About
With an extensive background in security engineering, consultancy and architecture, I have years of experience in delivering security architecture and security solution architecture to meet business aligned security requirements. I utilise a risk driven security architecture approach to implement strategies into logical designs, covering people, process and technology based security capabilities.
My core technical skills are in PKI and Cryptography with practical experience in Microsoft ADCS, PrimeKey EJBCA, Openssl and Thales general and payment HSMs.
Skills & Experience:
- Security Architecture (SABSA Methodology & Capability based approach)
- Security Consultancy
- Security Solution...
Tags
big data analytics
cyber security
security analytics
cyber threats
See more
Presentations
(3)Likes
(3)Ea intro
Akshyadeep Raghav
•
5 years ago
Big Data Analytics for Cyber Security: A Quick Overview
Femi Ashaye
•
8 years ago
Risk-driven and Business-outcome-focused Enterprise Security Architecture Framework by Ana Kukec
Craig Martin
•
11 years ago
Personal Information
Organization / Workplace
London, United Kingdom United Kingdom
Occupation
Security Architect
About
With an extensive background in security engineering, consultancy and architecture, I have years of experience in delivering security architecture and security solution architecture to meet business aligned security requirements. I utilise a risk driven security architecture approach to implement strategies into logical designs, covering people, process and technology based security capabilities.
My core technical skills are in PKI and Cryptography with practical experience in Microsoft ADCS, PrimeKey EJBCA, Openssl and Thales general and payment HSMs.
Skills & Experience:
- Security Architecture (SABSA Methodology & Capability based approach)
- Security Consultancy
- Security Solution...
Tags
big data analytics
cyber security
security analytics
cyber threats
See more