Maximum upload file size: 3MB. File types allowed: jpg, jpeg, gif only.

Click the above 'Browse' button to select a photo.
Guidelines
  1. Only upload a photograph of yourself
  2. Photos of children, celebrities, pets, or illustrated cartoon characters will not be approved
  3. Photos containing nudity, gore, or hateful themes are not permissible and may lead to the cancellation of your account
  4. Photos of your passport, ID, or photos containing any personal information such as your address, passport number, or contact details are not permissible for your own security.

Delete Guidelines

Frederick Gyebi-Ababio

Owner and Director

Location:
United Kingdom - London
Education:
High school or equivalent, Building And Engineering
Experience:
18 years, 1 month

Work Experience

What's your work experience? Your experience is one of the most important sections in a CV.
List all relevant responsibilities, skills, projects, and achievements against each role.  If you're a fresh grad, you can add any volunteer work or any internship you've done before.
Add Experience

Total Years of Experience:  18 Years, 1 Months   

June 2011 To Present

Owner and Director

LawTech Europe Congress / Technology Event Management / Belgium
Tasks: Developing a cybersecurity and forensics event in CEE

Developing LawTech into a global brand
Managing key accounts, marketing, sales, technical content, and acting as lead spokesperson for LawTech Europe Congress
Developing relationships with other large global media and event management firms
September 2017 To June 2021

Senior Information Security Consultant

at CARMAO
Location : Germany
July 2018 To May 2019

Information Security Consultant

at Shell
Location : Netherlands - The Hague
• Using Symantec DLP for Data leakage Prevention
• Business Impact Analysis for new and existing projects
• Risk Assessment for business operations
• Assess security architectures for Shell´s ICS/OT environments
• Providing advice and consultancy to senior management regarding the development enterprise security controls and incident reduction
• Controls to detect and prevent fraud and the insider threat for Shell Global Operations Centres
• Analysing out-of-normal user behaviour to counter fraud, collusion, as part of insider threat management
• Communication with stakeholders to track existing information risks and controls
• Working with Shell Global business operation centers on information risks and incidents
• Application of ISO 27001 controls
• Managed information risk for Bangalore, Chennai, Kuala Lumpur, Krakow, and Manila
September 2016 To January 2017

IT Security Consultant

at GDPR Readiness
Vodafone Global / Telecoms / United Kingdom
Tasks: Security Risk Assessments

ISO27001 Information Security Assessment for Vodafone Global Projects
Conducting security awareness campaigns and awareness training
Analysis of cybersecurity threats and reporting to management
Analysis of Identity and Access policies
Recertification of privileged users
Assessment IT Dependency on cloud service providers
April 2016 To August 2016

IT Security Consultant

AG Insurance / Financial Services / Belgium
Tasks: Vulnerability Management/ Security Awareness

Security assessment for Mobile Device Management software from Blackberry
Virtualization and cloud computing technologies
Reviewing security aspects of desktop migration from Win 7 to Win10
Qualys Web Application and PCI Scanning
Conducting a study for AG Insurance on network segmentation for enhanced security
Managing the security response for serious security breaches such as ransomware
November 2015 To December 2015

IT Security Consultant

Forensic Data Services / Forensics and Security / USA
Tasks: Threat and Vulnerability Management / Compliance Reporting

Assessing results from vulnerability scans and PCI Pen tests
Sox Compliance Assessment and reporting
Risk assessment in line with the bank’s business objectives
Communicating results of digital forensic investigations to senior management
April 2015 To July 2015

Cyber Security Consultant

WorldPay/ Payment Processing / UK
Tasks: Threat and Vulnerability Management

Running and managing Qualys scans in line with WorldPay’s Governance, Risk, and Compliance policy
Advising our operations team teams on vulnerability assessments
Assessing vulnerabilities and rating them in line with business objectives
Assessing pen-testing results
Application of COSO ERM framework
Solid understanding of the Vulnerability Management life cycle.
Developing and managing monthly vulnerability and patching reports
June 2010 To May 2011

Web Security Architect

Atlas CopCo / Manufacturing / Czech Republic
Tasks: Web Application SSO integrations using Oracle Access Manager

Involved in various discussions related to integrating Access manager in software as a service platform
Extensive use of Oracle 10g in Production and 11g in our Test Environment
Knowledge of Oracle Identity Analytics
Defining Websecurity Architecture Roadmap
Project and problem management, monitoring, and maintenance
Analysing risk trends and Developing Security process improvements
May 2009 To December 2009

Operations Security Specialist

Tasks: Vulnerability Management and Compliance Reporting

Assessing the risk to EA information and recommending appropriate controls. Analysing the Agency’s risk register and proposing effective countermeasures. Developing information security metrics for better security management.
Creating security compliance reporting for senior management.
Assessing technical vulnerabilities to servers and desktops using the qualys vulnerability management tool. Creating management reports on AV and Patching progress for the EA estate. Assessing and escalating security incidents to the point of resolution, including best practice change management procedures.
Experience in a vibrant SIEM SOC environment for security incidents management
Working with our project business units and updating policies, procedures and guidelines
Selecting external vendors to make sure that are risks are being managed effectively
December 2008 To February 2009

Business Advisor

Home Office/ Public Sector/ UK
Tasks: Security Compliance

Developing a risk management approach to Data handling for business units within the Home Office
Interpreting the broad requirements of the recent Hannigan report from the cabinet office
Drawing up an Action Plan to implement the Coleman recommendations on
Information Assurance for the Home Office
Communication with stakeholders and collecting their security requirements to ensure that the IT Security Governance, Risk and Compliance was auditable and repeatable
Assessing the risk analysis and RMADS document for a major Home Office system
Assessing business unit risks on behalf of the Home Office SIRO
Assisting Home Office Information Asset Owners identify and assess risks to their information assets
Application of HMG Manual of Protective Security and other infosec requirements
Group to discuss the progress of the Information Assurance Programme
May 2008 To August 2008

AXA - Tech/ Financial Services/UK
Tasks: Data Leakage Prevention and Vulnerability Management

Monitored and prevented data leakage through removable media, email, and spyware exploitation
Data protection and retention policy formation
Generated detailed reports to demonstrate compliance with internal and regulatory privacy requirements to auditors, board members, and other stakeholders of AXA-TECH
Reviewing PCI DSS pen test results
Problem Management and effective change management in an ITIL environment.
Raised change requests to ensure that the identified vulnerabilities were patched
PCI DSS compliance using Qualys reports
SOX compliance reviews carried out
Review and analyse reports from all our security tools
Installing Qualys and scoping for penetration testing
February 2008 To May 2008

Information Security Specialist

Crown Prosecution Service/ Public Sector/ UK
Tasks: Internal Information Security Audit

Developing a risk management approach to IT Security Audit within the CPS
Assisting with ISO 27001 auditing exercise at CPS
Identifying the branches of CPS that are carrying out adequate security awareness training in accordance with ISO 27001
Auditing of CPS payroll systems in relation to RMADS document
Assisting Internal audit to review and evaluate CPS IT Security Infrastructure and its adequacy
Evaluating the effectiveness of CPS’ business continuity plans
Putting forward solutions for minimising the identified risks
Identifying risks associated with CPS data transfers to 3rd parties
Mapping instances of Data sharing with partners and ensuring that SLA’s are established
Interviewing the MIS board members to clarify CPS’ application of its risk appetite
October 2007 To January 2008

Security Operations Specialist

AXA-Tech/ Financial Services/UK
Tasks: Risk and Vulnerability Management

Risk assessments using FIRM, Citicus One
Policy compliance for SOX purposes
Threat & Vulnerability analysis and reporting using Qualys Guard
Reviewing Standards, Procedures & Guidelines for AXA-TECH
Monitored Email that was quarantined to verify their content and impact on AXA’s network and reputation
Discussing Pentest results with business owners
Assessing the completion of remediation actions
Implementing a sound security methodology and controls
Applying the SABSA framework when selecting appropriate vendors at AXA
Prevented data leakage through removable media and spyware
Produced weekly reports of vulnerabilities against platform types
Raised change requests to ensure that the identified vulnerabilities were patched
Created MI reports to demonstrate that AXA-TECH was carrying out due diligence and care as well as implementing measures to improve service quality and delivery towards the SLA’s
September 2006 To September 2007

Enterprise Architect

Capgemini/ Technology / UK
Tasks: Project Management and Consulting

Designing Security Architecture for NHS Connecting for Health
Use of Togaf framework at the NHS
Rollout of strategic remote access technologies on the HMRC Aspire project
Providing consultancy in aspects of security, including policy, strategy, architecture and technology solutions
Conducting interviews with business units to identify stakeholder requirements for a Security Governance, Risk and Compliance process and framework
Worked with Customer Security Managers, Security Governance Architects, Technical Architects, and Solution Designers
Ability to formulate a security management vision
Experience in the health sector
April 2006 To September 2006

Information Security Analyst

AXA-Tech/ Financial Services/UK
Tasks: Security Management

Influencing and promoting security principles
Policy compliance and security monitoring
Carrying out awareness training, and writing awareness articles
Documenting and communicating security standards to support the IT security policies of AXA-Tech
Assisting with implementation, operation and maintenance of appropriate information Responsible introducing researching a credible security governance, risk and compliance framework to implement within the security management team
security controls for services delivered or used by AXA Tech UK
Ownership of problem cases till their resolution is reached
Client-facing experience at all levels
September 2005 To March 2006

Information Security Specialist

NHS - Western Area Health Trust/ Public Sector/ UK
Tasks: Governance/Compliance

The access of GP surgeries and other trusts to Weston’s databases and confidential patient records
A classification of the trust’s assets
Assessing results of a trusted third-party’s penetration testing
Assessing physical security and access controls for the server rooms
Investigation of crucial updates to firewalls, switches, routers, servers, and desktops
April 2005 To July 2005

Information Security Consultant

FCT/ Financial Services/ UK
Tasks: Risk Analysis/Security Management/Auditing

Sarbanes-Oxley Act 2002 for the Chicago based offices
BS7799 for UK based offices













Page | 5

Education

What's your educational background?
Let employers know more about your education; remember, be clear and concise.
January 1994

High school or equivalent, Bsc Building Engineering

at Bath University
Location : United Kingdom
June 1994

High school or equivalent, Building And Engineering

at Leyton SixthForm College
Location : United Kingdom - London
courses: CISSP Certified
•CISA Certified
•Certified Forensic Investigation Practitioner
•Qualys Qualified Administrator
•Ironport Support Engineer

Specialties & Skills

CONTENT MANAGEMENT

EVENT MANAGEMENT

EXECUTIVE MANAGEMENT

FINANCIAL

INFORMATION SECURITY

MANAGEMENT

MARKETING

MICROSOFT ACCESS

POLICY ANALYSIS

Vulnerability Management

Controls

Risk Management

ISO 27001

Languages

Do you speak more than one language?
For some jobs, fluency in one or more foreign languages is a plus, so add your language skills to get better results.

Czech

Expert

English

Native Speaker

Spanish

Intermediate

Training and Certifications

CISSP ( Certificate )

Hobbies and Interests

Share your hobbies and interests so employers can know more about you.
Help employers know more about you by looking at your hobbies and interests

Running, Cycling

Loading
Loading...
Loading...