I am currently employed by a world-leading Financial Institution as part of the Malware Incident Response team. I am responsible for the immediate containment, eradication and recovery from serious, complex malware attacks targeting the company infrastructure. I reverse engineer malware, neutralise the threat and bolster the defences of the organisation. I also carry out leadership duties for the wider Cyber Threat Monitoring & Response team alongside senior management. I'm highly experienced with managing incidents such as large scale malware campaigns, social engineering attempts, network attacks, third party compromises, data exfiltration, system vulnerabilities and complex technology issues.
I hold two current SANS GIAC Certifications having completed the following Cyber Security courses:
SANS FOR610 GREM - 92% GREM holders demonstrate the knowledge and skills to reverse-engineer malware that targets common platforms, such as Microsoft Windows and web browsers. Professionals holding the GREM know how to examine inner-workings of malware in the context of forensic investigations, incident response, and Windows system administration.
SANS SEC504 GCIH - 91% GCIH holders demonstrate their ability to manage security incidents by understanding common attack techniques, vectors and tools as well as defending against and/or responding to such attacks when they occur. The GCIH certification focuses on methods used to detect, respond, and resolve computer security incidents. Professionals holding the GCIH are qualified for hands-on and leadership positions within incident handling teams.
I am extremely passionate about Computer Science and Security and have completed several open courseware certificates, such as:
- Cybersecurity - University of Maryland 2014 - 2015
- Wiretaps to Big Data (ENGRI1280x) - Cornell University - 2014
- CS50x - Harvard University - 2012 - 2013
- 6.002x - Massachusetts Institute of Technology (MIT) - 2011 - 2012
View more about my education and technical background here .
Opportunities I'm Interested In
I'm interested to discuss opportunities within the Cyber Security space which require leadership, technical skill and influence at Senior levels. I bring a wealth of skills, passion and leadership ability to the table and am interested in growing the capabilities of the team around me.