Introduced a Zero Trust Framework to the Architecture Practice by presenting a strategic plan to key leaders, including the Chief Architect, Chief Engineer, and Senior Managers.
Developed a ZTA Capability model and Reference Architecture model, along with threat models, to illustrate how existing capabilities align with future strategy and deliverables.
Ensured security compliance by performing weekly Security Architecture Reviews that integrated standards from NIST CSF, CIS, PCI-DSS, ISO, SOC, Zero Trust, SABSA, and OWASP.
Executed an in-depth analysis of architecture blueprints (ABPs) against established technical standards to identify and mitigate potential threats or inconsistencies. This included a focus on critical areas such as Identity and Access Management, Data Protection, Application Security, and Cloud Infrastructure Security.
Cyber Security Analyst
Audit Armor
Toronto, Ontario
01.2024 - 02.2025
Developed comprehensive reports on vulnerability and risk, along with security excellence metrics, and presented them to executives through data visualizations.
Provided consultation on Information Security best practices to project teams, Lines of Business, and DevOps, ensuring a strong alignment between business goals and security objectives.
Drafted and maintained governance documents that established technical controls for key domains such as Encryption and Hashing, Data Masking, Cryptography, IAM, Digital Crown Jewels (DCJ), Cloud Security, Data Protection, and Data Destruction.
Maintained the operational environment for PKI and cryptography, overseeing the entire life cycle of encryption, crypto keys, and certificate management.
Education
Master of Science - Computer Science, Cyber Security
University of Guelph
Guelph
Skills
MS Office
Confluence
Jira
Python
Java
C
R
SQL
Linux
Amazon Web Services
Microsoft Azure
OWASP
NIST
ISO27001
PCI-DSS
Zero Trust
TOGAF
SDLC Agile
Business Intelligence
Tableau
Power BI
Accomplishments
Applied strategic problem-solving techniques to lead projects successfully in a highly dynamic environment.
Transformed complex data from monthly risk assessment reports and security architecture reviews into clear, actionable presentations for stakeholders.
Improved cross-functional alignment by consulting with diverse LOBs and using strong communication skills to implement organizational best practices.