Experience Summary
|
He possesses extensive experience over 20 years in both technology and cybersecurity.
Current & Previous Employers and jobs include:
Cyber Security Risk Assessor at XXX
IT Manager - Security & Technology Compliance at XXX
Security and Compliance Manager at XXX
Cyber Security Officer at XXX |
Education
|
BEng (Hons) Information Engineering
City University of XXX
Postgraduate diploma in professional Accountancy
XXX University
|
|
|
|
Interview Assessment Notes
|
1. Could you introduce yourself and tell us about you? Your current / recent jobs and employers? Previous companies and jobs?
He possesses extensive experience over 20 years in both technology and cybersecurity. While comfortable with lower-level technical support and specialist roles, his expertise lies in the HS/Basil field. Here, he demonstrates a deep understanding of various technologies, campaign implementation, and equity research security practices. Furthermore, his skills extend to working with different company multimedia plans and collaborating effectively with various teams, including second and third-tier compliance, internal auditing, and internal assessment functions. He possesses a strong knowledge base and technical skills in policy development, policy crafting, IT audit functions, and audit tracking. Additionally, his understanding of NIST and CISA guidelines ensures adherence to industry best practice.
2. What skill(s) / experience would you self-describe as strongest or specialist in?
He excels at internal auditing across various industries, with experience ranging from financial services to telecommunications. His expertise lies in security operations, monitoring, and tracking activities across different types of companies. Additionally, he possesses a strong understanding of information security policies and leadership dynamics within organizations.
3.Do you have the lists of key criteria’s according to the clients’ requirements?
He has experience in information security, some guidelines, order and ISO. His expertise lies in guiding organizations on various information security frameworks. This includes established standards like ISO 27001 ISM and ISO 27002 ISC, as well as emerging protocols like ISO 27701 PIM. He also possesses knowledge of cloud security and governance, particularly concerning security operations ISO 27017. His understanding extends to recent developments like the masking of AI data and the evolving ISO standards.
|
Recruiters
|
|
Employment Agency
|
Silicon Valley Associates Recruitment.
907, 9th Floor, Silvercord Tower 2, Tsim Sha Tsui. Kowloon, Hong Kong
25F, Central Plaza, Xin Tian Di, Shanghai
Ubi TechPark #01-08, Singapore
Dubai World Trade Centre, Sheikh Zayed Rd, Dubai, United Arab Emirates
|
|
|
|
|
Job-Seeker Agreement
|
The Candidate has agreed that Silicon Valley Associates Recruitment may disclose their profile to potential employers for the purpose of seeking new employment. Silicon Valley Associates Recruitment will never charge any fees from job-seekers.
|
Employer Terms
|
General Terms and Conditions apply to all requests, offers, and agreements regarding the provision of services, and are available upon request. These can be sent to you on request or can be found on our website: svarecruitment.com.
|
|
|
|
|