Results-driven Senior Manager in Technology & Cybersecurity with extensive experience in internal audit, penetration testing, risk assessment, and regulatory compliance. Demonstrated leadership in conducting cybersecurity audits, vulnerability assessments, and forensic investigations across diverse industries including telecommunications, banking, and consulting. Skilled in developing security frameworks, enhancing threat intelligence capabilities, and providing strategic guidance to leadership on cybersecurity risks.
Technology & Cybersecurity Audits
Risk Assessment & Assurance
Regulatory & Compliance Oversight
Incident Response & Forensic Investigations
IT Governance & Framework Evaluation
Data Analytics & Emerging Technology Risks
Stakeholder Engagement & Advisory
Continuous Improvement & Best Practices
Audit Team Leadership & Development
Third-Party & Vendor Risk Management
[+] Information Systems Auditing in client's network.
[+] Ensuring Information Security best practices are implemented and adhered to.
[+] Developing and implementing a comprehensive plan to secure our computing network.
[+] Monitoring network usage to ensure compliance with security policies.
[+] Works with incident response teams to identify and monitor security threats to an organization’s cyber systems.
[+] Keeping up to date with developments in IT security standards and threats.
[+] Performing penetration tests to find any flaws.
[+] Collaborating with management and the IT department to improve security.
[+] Documenting any security breaches and assessing their damage
[+] Educating colleagues about security software and best practices for information security.
[+] Telco & Cyber Security Assessments through:
[*] GDPR & Popia based assessments.
[*] Mobile Services(IMS, Radio Interface Security, Node Configuration Reviews, 5G Security Aspects).
[*] Fixed Line Network Security Assessments, Revenue Leakage Analysis, Threat Modelling, Vulnerability Management, Threat Intelligence & Hunting.
[*] Hardware Penetration Testing, IT Infrastructure, Android Applications, Web Applications ,API, Smartphone, Customer Premises Equipment(Routers, Switches, IoT devices).
[+] Perform penetration tests against internal and external facing systems.
[+] Provide input to improve the quality and effectiveness of tests in a highly scaled and global environment.
[+] Articulate complex technical risks through creation of reports and delivering presentations to key stakeholders.
[+] Work with the SecOps teams to test the orchestration and automation processes and platforms, feed results into a testing program.
[+] Support the assessment risk and the development and/or recommends appropriate mitigation countermeasures based on empirical testing.
[+] Provide comprehensive technical expertise with web application and database vulnerability testing
[+] Support the development of the security automation framework and the implementation roadmap.
[+] Form part of the Cyber Security Offence team
[*]Operational capacity planning
[*]Co-ordinate and schedule scoping sessions amongst system stakeholders and technical contacts
[*]Solution and white-boarding of systems to be assessed
[*]Ability to assess various technologies and systems across diverse and innovative API’s (web services), web applications, mobile applications, thick thin clients, cloud as well as general network Infrastructure environments
[+] Develop, implement, and execute on the Offence team’s strategic objectives
[*]Assist in the development of the annual Cyber Security Team strategy
[*]Contribute with implementation plans aligned to the annual Cyber Security Team strategy
[*]Support the delivery of these plans by the Offence team members
[*]Ensure the timely execution of the implementation plan to the agreed standard
[*]Coordinate and negotiate with other internal IT and business teams to meet Defence team objectives
[*]Propose ideas solutions based on research and development
[+] Provide Cyber Security consulting to the business
[*]Provide professional advice and expertise to the organisation in the following areas:
[-]Cyber Security Testing
[-]Cyber Risk Identification and Remediation
[-]Cyber Attacker Tools, Techniques, and Procedures
[-]Innovation towards automation in key areas of testing
[*]Contribute to technical security standards and policies
[*]Cyber Security Technical advisor and subject matter expert
[*]Coordinate and negotiate with internal IT and business teams to meet objectives
[*]Raise Cyber Security awareness within the Bank
[*]Influence the Secure Dev Ops culture of the bank and its development initiatives
[*]Provide insightful reporting on assessments and articulate the risk back to business
[+] Expand the capabilities of the Offence team
[*]Identify the business’s Cyber Security needs and expectations, extend the Offence team’s services and capabilities to support the business initiatives
[*]Monitor the external and internal threat landscape, with a view to continuously improve upon the Offence team’s skills and capabilities
[*]Specifically improve existing API’s (web services), web mobile application, cloud and general network infrastructure and service security testing capabilities
[*]Foster relationships with business units and ISO partners
[+] Improve the Offence team’s Cyber Security testing services
[*]Manage security testing engagements through the security assessment lifecycle
[*]Perform or provide oversight and mentoring for technical risk assessments
[*]Co-ordinate assessments with internal and external stakeholders
[*]Collaborate in third-party security testing engagements
[+] Collaborate with the cyber-security Defence team
[*]Foster and maintain the strong collaborative environment between the Cyber Security teams
[*]Conduct table-top exercises to test the Defence team’s incident response policies and procedures
[*]Participate in technical “purple team” and “red vs blue” exercises
[+] Incident Management
[*] Data Loss Prevention incidents
[*] System Configuration Management violations
[*] Performance degradation from malware
[*] Spam handling (Analysis and Reporting)
[+] Logical Access Management
[+] Change Management
[*] Security Patch Management
[*] SCM integrity checks
[+] Service Level Management
[*] OLA and SLA performance that relate to back office and service providers.
Gather, interpret and document the requirements for the development, delivery and support of quality IT/IS solutions for the relevant business area or customer through various types:
Understand the business strategy and plans for work that has been allocated.
Gather business requirements through various methods such as initiating
interviews, document analysis, requirements workshops, surveys, site visits,
business process descriptions, use cases, scenarios, business analysis and
task workflow analysis.
Translate business requirements (Functional and non-functional) and plans into
IS/IT artefacts ( High level demand analysis, User Requirements
Specification(URS), Functional requirements specification, use cases, test
cases and plans, or other required IT governance documentation). Propose
option/s & solution/s to meet customer requests.
Analyze work practices and processes and identifying improvement
opportunities to increase capabilities and/or productivity where relevant.
Identify business environment changes, projects and initiatives and their
impact on broader spectrum of business operations where relevant.
Facilitate alignment of IT solutions/systems to the Group IT strategy
and roadmaps.
Represent Group IT by participating in relevant various business
interventions where relevant.
Obtain business approvals for relevant documentation.
Provide project support in terms of:
Provide input to change management and communication plan.
Provide input to training material and training efforts coordination.
Assist with User acceptance testing coordination.
Perform sit readiness assessment with allocated area of responsibility through Project Communication to the business, Business prioritization alignment and follow up with business and site roll out facilitation.
Provide Project Management support as per relevant process/processes
within allocated area of responsibility:
Population of required project related documentation.
Obtaining of relevant approval.
Monitoring of project according to relevant PLCM
Customer Liaison by:
Coordinating all customer relations, demands and request for customers.
Ensuring customer visits so that customer needs form the basis of all SLA’s.
Advising customers on services provided by attending operational forums.
Advising Group IT customers on new services and technology requirements.
Advising Group IT customers of best utilization of commercial software.
Monitor services delivered by:
Monitoring all operational activities within service level agreements.
Coordinating the process to establish and resolve non-conformance.
Obtaining customer feedback on service provided.
Business demand facilitation by assisting BRM with managing demands
and requests for/from customers.
Implement SLA’s in business by:
Ensuring that both customers and service providers implement processes to
manage the service and performance criteria of the agreement. Communicating
to all stakeholders with regards to changes of a particular SLA. Analysing and
interpreting monthly reports on actual performance vs SLA criteria. Providing
financial reporting on payment to service provider’s vs actual service delivered.
Performing service delivery audits and report deficiencies.
Preparation of audited data in Excel and Access for further manipulation by data
officers and regional staff.
Drawing data related reports in Access, SQL talk and SQL plus.
Assist with upload and download of; customer data to and from CRP.
Development of small ad-hoc queries with Access front-end to be used by data
officers / temporary resources.
Business Improvement Projects
Do gap analyses of the monitoring system and business support structures, and
clearly map the to-be process that support the upgrades as per BRS document
Involvement and understanding of the IM application system problems solution
process.
Installation of software.
Liaise with developers for any system problems.
USVD monitoring and solution process.
Grant access to users according to security standards.
Update and auditing of system user lists.
Help in Design and Maintaining the IM Web site
Perform testing of new and upgraded versions of systems.
Facilitate System training for new users.
Help in the development of IM related system training manuals.
Perform system performance audits.
Auditing
Identity Management
Cloud Security
IT Risk Management
Data Analytics
Forensic Investigations
IT Governance
Security Frameworks
Regulatory Compliance
Pentester LAB Unix Badge
Certified Red Team Professional