Cyber Security Lead
Lincolnshire County Council
مجموع سنوات الخبرة :11 years, 10 أشهر
• Developed a security awareness program: I designed and implemented an engaging security awareness program that significantly improved employee understanding of security practices. By conducting regular workshops, webinars, and interactive sessions, I ensured that staf members were well-informed about phishing threats, password hygiene, and safe online behaviour.
• Security strategy and compliance: Collaborating closely with the National Cyber Security Centre (NCSC) guidelines, I formulated a robust security strategy. This strategy efectively mitigated cyber threats and ensured compliance with industry regulations. Key components included risk assessments, vulnerability management, and incident response planning.
• Data protection and encryption: As part of our defense-in-depth approach, I oversaw the implementation of Data Loss Prevention (DLP) mechanisms. This included encryption protocols for data at rest and in transit. By enforcing strong encryption standards, we safeguarded sensitive information from unauthorized access.
• Network security enhancements: To fortify our network infrastructure, I led the deployment of a complex security system. This involved configuring firewalls, intrusion detection/prevention systems, and secure access controls. By continuously monitoring network trafic and addressing vulnerabilities, we significantly reduced the risk of cyber threats.
• Penetration testing and incident simulation: Regularly conducting penetration tests and simulated cyber attacks allowed us to identify and address potential security vulnerabilities proactively. By staying ahead of emerging threats, we maintained a resilient security posture.
• User data protection: I meticulously configured and maintained network security settings to ensure that user data remained protected. This involved access controls, user authentication mechanisms, and secure communication protocols.
• Azure Active Directory deployment: I played a pivotal role in designing and deploying Azure Active Directory (AD). This centralized identity management system streamlined user access and enhanced security. By integrating single sign-on (SSO) capabilities, we improved user experience while maintaining robust security controls.
• Compliance and risk management: Ensuring ongoing compliance with the Payment Card Industry Data Security Standard (PCI-DSS) was a critical aspect of my role. I conducted regular audits, vulnerability assessments, and gap analyses to identify areas for improvement. By addressing compliance gaps promptly, we minimized risk exposure.
• Information Security Policy Framework: I defined and embedded an Information Security Policy Framework aligned with relevant legislation and industry standards (including NCSC guidelines). This framework covered data handling, incident reporting, and access controls. By promoting adherence to these policies, we fostered a security conscious culture.
• Stakeholder engagement: Advising and directing the Executive and Senior Leadership Team on security practices was essential. I facilitated workshops, presentations, and executive briefings to emphasize the importance of security in strategic decision-making. By aligning security objectives with organizational goals, we achieved better risk management.
• Strategic planning and budgeting: I established clear and measurable strategic plans, budgets, and targets for Information and Cyber Security. These plans guided our investments in security technologies, training programs, and risk mitigation initiatives. By balancing cost-efectiveness with risk reduction, we optimized our security posture.
• Security Standards and Guidelines: Developed and implemented robust information security standards, guidelines, and procedures. These measures ensured consistent security practices across the council.
• Subject-Matter Expertise: Served as a trusted Subject-Matter Expert (SME) for security topics and issues within the council. My expertise guided decision-making and risk management.
• Audit Oversight and Remediation: Led information security and compliance audits, collaborating with team leads to set up efective remediation plans. By addressing findings promptly, we maintained a secure environment.
• Policy Enhancement: Reviewed existing policies and created new ones in alignment with National Cyber Security Centre (NCSC) best practices. These policies provided clear guidance to staf and reinforced security controls.
• Vulnerability Testing Management: Took responsibility for managing all vulnerability testing activities within the organization. Initiating improvements to test processes and capabilities allowed us to proactively address vulnerabilities.
• ISO27001 Implementation: Successfully facilitated the end-to-end implementation of ISO27001 certification for Interpath Advisory. This achievement demonstrated our commitment to robust information security practices.
• Business Unit Compliance: Collaborated with multiple business areas and leadership to ensure compliance with the implemented security controls. By aligning business units, we maintained a consistent security posture.
• Mapping Security Controls: Mapped the Statement of Applicability (SoA) with security controls for ISO27001 audits. This alignment ensured that controls were efectively implemented and monitored.
• Certification and Compliance: Audited and certified the organization for Cyber Essentials (CE) and CE Plus, achieving full compliance across multiple business areas. Our rigorous approach enhanced security resilience.
• Policy Framework Enhancement: Wrote a new set of policies in line with the NIST framework. These policies provided clear guidelines for secure practices.
• Third-Party Engagement: Engaged and directed third-party consultants during audits, ensuring comprehensive assessments and adherence to standards.
• Stakeholder Commitment: Obtained commitment from Senior Management and support from other stakeholders, reinforcing the importance of security practices.
• Policy Monitoring and Reporting: Ensured efective monitoring and reporting of all implemented policies to maintain adherence to standards.
• Accreditation Leadership: Led the accreditation process for PSN (Public Services Network), Cyber Essentials, and Cyber Essentials Plus. Collaborated with auditing bodies to achieve and maintain compliance with relevant national and international standards.
• Risk Assessment and Policy Integration: Conducted risk assessments for technology design and change initiatives. Ensured that relevant policies were integrated into services and that vulnerabilities were minimized during the change process.
• Expert Guidance: Provided expert advice and guidance to Members, Executives, senior stakeholders, and technology users. Ensured awareness and compliance with relevant policies to mitigate risks.
• Collaboration with Experts: Collaborated with experts from legal, commercial, and technical functions to define security controls and requirements.
• Security Training and Awareness: Developed and delivered security training and awareness programs for over 3000 staf and contractors within the council.
• Disaster Recovery Preparedness: Identified and implemented recovery operations and methods to allow the organization to function at limited or partial capacity in case of infrastructure damage.
• Practice Drills and Risk Management: Created and facilitated practice drills for disaster recovery plan execution. Provided staf training on risk management and disaster recovery.
existing IT security practices and systems Identified areas for improvement to enhance overall security posture.
• Policy Guidance and Compliance: Provided expert advice and guidance to Members, Executives, and senior stakeholders. Ensured awareness and compliance with relevant policies.
• Technology Policy Development: Led the design, development, and implementation of technology policies covering areas such as Risk and Compliance, Business Continuity, Disaster Recovery, and Information Security.
• Monitoring and Reporting: Ensured adherence to implemented policies by monitoring and reporting high standards across the organization.
• Cybersecurity Awareness Training: Introduced and delivered cybersecurity awareness training during corporate induction. Raised awareness among the Trust Board of Directors and Senior Management Teams (SMTs).
• Business Continuity Planning: Developed and implemented business continuity plans to ensure uninterrupted service during change programs, security breaches, or disaster recovery scenarios.
• Risk Mitigation Strategies: Devised strategies and implemented IT solutions to minimize cyber-attack risks.
• Cloud Migration Coordination: Collaborated with the wider project team, Service Cloud Operations, CISO, and third-party providers (Networking/Firewall, Cloud exchange support, Platform Infrastructures, Applications) during the migration to AWS and Oracle Cloud.
• Incident Triage and Escalation: Mapped the Major Incident Team triage process and Defined escalation processes between the Cloud Managed Service provider (Oracle) and the Security Operations Center (SOC) team.
• Requirements Analysis and Agile Practices: Elicited, analyzed, and prioritized functional and non-functional requirements using Agile Scrum, Jira, and Confluence.
• Security Controls Implementation: Facilitated the implementation of security controls using tools such as Monitoring and Logging, WAF, MFA, SSO, and IAM/PAM.
• Agile Project Management: Managed sprint planning, user story refinements, retrospectives, product backlogs, and sprint logs.
• Stakeholder Engagement and Security Controls Agreement: Engaged with business and technical stakeholders to capture and agree on applicable security controls. Covered areas like Access Control, Password Standards, Data Encryption, Privilege Access Management, Vulnerability Scans, and Intrusion Detection System (IDS) during the migration to AWS and Oracle cloud.
• Vulnerability Assessment and Patch Management: Supported scoping of pre and post-penetration tests to identify vulnerabilities ensuring required patches were applied to reduce the impact of cyber-attacks and threats.
• ISO 27001/2 Adoption: Ensured that cyber security assurance considered data sensitivity (including PCI DSS and PII data which promotes adoption of ISO 27001/2 standards during data assurance and encryption.