Security Operations
- IDS/IPS
- Firewalls
- Mobile Security
- Threat Intel
- Forensics
- Malware Analysis
- AV Management
- IR Procedures
To download my CV please submit your email address and you will be emailed a download link to a PDF copy.
Reporting directly to the Head of Information Security, I was responsible for the protection of IT infrastructure, co-ordinating security operations (SOC), and acting within the digital environment to manage the security, safety, and operational effectiveness of journalists and their sources.
Responsibilities included:
Worked closely with the ISO, Operations, Architecture and Engineering teams to ensure that computer systems and facilities remained secure and that IT security was effectively managed.
Responsibilities included:
Responsible for working as part of the GRC function to support DLP and information assurance. Took ownership of driving security initiatives, auditing of operational processes, and supporting a culture of continuous improvement.
Responsibilities included:
Comprised of some of the most sought after security researchers in the world, the Synack Red Team (SRT) is a private freelance security research team that spans 6 continents and over 80 countries to help protect the best brands in the world.
Research activities include:
An alert subscription service offering companies and individuals web based tooling to automate the continuous discovery of public-facing subdomains within their DNS zone estate, and alert on any which may be identified as vulnerable to malicious takeover.
Responsibilities include:
Fobber is an online platform that provides fast and affordable key fob cloning services across the UK.
Responsibilities include:
Subject Access is a web-based platform centred on GDPR law to assist UK/EU citizens with exercising their right of access (Data Subject Access Requests) through the use of interactive and user-friendly web forms.
Responsibilities include:
Deadswitch is a zero-knowledge mechanism, designed to protect journalists and whistle-blowers by enabling the targeted exposure of public interest material. As founder and director I am responsible for oversight of the project design, operations, and security controls.
Responsibilities include:
CryptKey was an early-development mobile application that leveraged existing wireless NFC features on modern smartphones to securely query implantable RFID tags for authentication.
Responsibilities included: