Cybersecurity Specialist with over 10 years of experience in safeguarding digital assets, mitigating risks, and enhancing the security posture of organizations across multiple industries.
Holding a BCA and a Post Graduate degree in Information Security, I bring together academic knowledge and hands-on expertise in penetration testing, risk management, security architecture, and enterprise-grade security controls.
Key Skills
I bridge the gap between technical security measures and business objectives. By combining offensive and defensive strategies, I deliver comprehensive cybersecurity solutions that protect your organization.
Specialized in Network & Web Application penetration testing to identify vulnerabilities before malicious actors do. I use advanced techniques to simulate real-world attacks and provide actionable remediation plans.
Expert in NIST, ISO, and CIS frameworks for comprehensive risk assessments. I help organizations achieve and maintain compliance while building robust security governance programs.
Rapid response capabilities for security incidents with thorough threat analysis. I investigate breaches, contain threats, and implement measures to prevent future incidents while minimizing business impact.
Implementation and management of enterprise security controls including EDR, OS logging, WAF, and firewalls. I ensure comprehensive coverage across all attack vectors and maintain optimal security posture.
Systematic vulnerability assessment and remediation planning using industry-leading tools. I prioritize vulnerabilities based on risk and business impact, ensuring efficient resource allocation.
Comprehensive security reviews for cloud environments and on-premises infrastructure. I assess configurations, implement best practices, and ensure secure architecture across hybrid environments.
Current Role
Leading cybersecurity initiatives to protect critical telecommunications infrastructure and ensure the security of millions of customers across Canada.
Conducting comprehensive security assessments across network infrastructure and web applications to identify critical vulnerabilities.
Identifying, analyzing, and coordinating remediation of security vulnerabilities across enterprise systems.
Ensuring organizational compliance with industry standards including NIST, ISO, and CIS frameworks.
Implementing and managing enterprise security controls including EDR, OS logging, WAF, and firewalls.
Advising leadership on security strategies, best practices, and risk mitigation approaches.
Industry-recognized certifications demonstrating expertise in cybersecurity, risk management, and penetration testing.
CRISC – Certified in Risk and Information Systems Control
PNPT – Practical Network Penetration Tester
Security+ – CompTIA Security+ Certified
CC – Certified in Cybersecurity
Technical Expertise
Proficient in industry-leading security tools and technologies that enable comprehensive protection across all layers of your organization's infrastructure.
SentinelOne
Microsoft Defender
CrowdStrike
Carbon Black
Palo Alto
Cisco ASA
Fortinet
pfSense
Tenable
Nessus
OpenVAS
Rapid7
Cloudflare
AWS WAF
F5 BIG-IP
Imperva
Splunk
ELK Stack
QRadar
ArcSight
NIST
ISO 27001
CIS Controls
OWASP
From penetration testing to compliance consulting, I provide end-to-end cybersecurity services tailored to your organization's unique needs.
Network, Web, and Applications
Comprehensive security assessments to identify vulnerabilities before attackers do. Includes detailed reports with remediation guidance.
NIST, ISO, CIS Consulting
Strategic risk assessments and compliance consulting to ensure your organization meets industry standards and regulatory requirements.
Threat Mitigation
Rapid response and investigation of security incidents with comprehensive threat analysis and containment strategies.
Training & Education
Customized security training programs to educate your team and reduce human-related security risks.
Security Reviews
Comprehensive security assessments for cloud environments and on-premises infrastructure with actionable recommendations.
Ready to strengthen your cybersecurity posture? Let's discuss how I can help protect your organization from evolving threats.
Available for global remote opportunities. Response within 24 hours.