Personal Information
Unternehmen/Arbeitsplatz
London, United Kingdom United Kingdom
Beruf
Security Architect
Info
With an extensive background in security engineering, consultancy and architecture, I have years of experience in delivering security architecture and security solution architecture to meet business aligned security requirements. I utilise a risk driven security architecture approach to implement strategies into logical designs, covering people, process and technology based security capabilities.
My core technical skills are in PKI and Cryptography with practical experience in Microsoft ADCS, PrimeKey EJBCA, Openssl and Thales general and payment HSMs.
Skills & Experience:
- Security Architecture (SABSA Methodology & Capability based approach)
- Security Consultancy
- Security Solution...
Tags
big data analytics
cyber security
security analytics
cyber threats
Mehr anzeigen
Präsentationen
(3)Gefällt mir
(3)Ea intro
Akshyadeep Raghav
•
Vor 5 Jahren
Big Data Analytics for Cyber Security: A Quick Overview
Femi Ashaye
•
Vor 8 Jahren
Risk-driven and Business-outcome-focused Enterprise Security Architecture Framework by Ana Kukec
Craig Martin
•
Vor 11 Jahren
Personal Information
Unternehmen/Arbeitsplatz
London, United Kingdom United Kingdom
Beruf
Security Architect
Info
With an extensive background in security engineering, consultancy and architecture, I have years of experience in delivering security architecture and security solution architecture to meet business aligned security requirements. I utilise a risk driven security architecture approach to implement strategies into logical designs, covering people, process and technology based security capabilities.
My core technical skills are in PKI and Cryptography with practical experience in Microsoft ADCS, PrimeKey EJBCA, Openssl and Thales general and payment HSMs.
Skills & Experience:
- Security Architecture (SABSA Methodology & Capability based approach)
- Security Consultancy
- Security Solution...
Tags
big data analytics
cyber security
security analytics
cyber threats
Mehr anzeigen