Edward Berkoh
Accredited Information Security Professional
Sutton, GB.About
Highly experienced and accredited Information Security Professional with over a decade of expertise in supporting Governance, Risk, and Compliance (GRC) functions across highly regulated sectors. Proven ability to apply key principles from frameworks like ISO 27001, NIST CSF, PCI-DSS, and GDPR to assess control effectiveness, manage risk registers, and drive audit readiness. Adept at cross-functional collaboration and strategic alignment of security practices with business and regulatory expectations.
Work
London, Greater London, United Kingdom of Great Britain and Northern Ireland
→
Summary
Played a pivotal role in strengthening organizational security governance by aligning business objectives with information security policies and regulatory requirements, providing oversight and assurance throughout project delivery lifecycles.
Highlights
Improved compliance posture across multiple programs by aligning all project security activities with ISO 27001, NIST CSF/800-53, and CIS controls, significantly reducing audit findings.
Strengthened design assurance by integrating policy compliance checks and control validations throughout the project lifecycle, leading to early identification and resolution of non-conformities.
Increased stakeholder confidence by delivering traceable, evidence-based assurance documentation, enhancing support for critical security decisions and demonstrating due diligence.
Defined and implemented robust security requirements aligned with ISO 27001, NIST CSF/800-53, CIS controls, and GDPR, ensuring comprehensive regulatory adherence.
Consulted on new designs by performing STRIDE threat modeling, proactively identifying risks and recommending effective mitigating controls.
London, Greater London, United Kingdom of Great Britain and Northern Ireland
→
Summary
Supported the implementation of business solutions by ensuring compliance with information security policies, regulatory requirements, and governance standards across key technology domains.
Highlights
Led technical security risk assessments and advised on control enhancements, significantly strengthening the enterprise's defence-in-depth strategy.
Improved stakeholder visibility of risk by ensuring key risks were documented, clearly communicated, and tracked for remediation within the enterprise risk register.
Influenced system and architecture design through GRC oversight, ensuring alignment with internal security policies, ISO 27001 controls, and regulatory standards.
Conducted comprehensive risk assessments on proposed solutions and architectural changes, identifying security risks and ensuring appropriate stakeholder visibility.
Utilized STRIDE threat modeling for business-critical systems, identifying threats and ensuring comprehensive control coverage across processes and data flows.
London, Greater London, United Kingdom of Great Britain and Northern Ireland
→
Summary
Supported information security functions by ensuring governance and assurance of security controls, and managing risks in line with Deutsche Bank's enterprise risk framework and compliance objectives.
Highlights
Reduced compliance gaps by supporting Risk and Control Self-Assessments (RCSA), identifying weaknesses, and escalating unresolved control issues for timely review.
Accelerated remediation timelines by facilitating risk acceptance and mitigation planning with business stakeholders, significantly reducing open policy exceptions across key domains.
Planned and conducted assurance testing for RCSA, documenting findings and recommending effective mitigation actions.
Prioritized assurance coverage based on risk exposure, focusing efforts on high-impact areas to enhance audit readiness and regulatory alignment.
Provided security oversight and risk guidance for IT projects, evaluating technical controls and policy adherence to ensure compliance.
London, Greater London, United Kingdom of Great Britain and Northern Ireland
→
Summary
Supported secure infrastructure transformation across Old Mutual's business units by partnering with project teams and stakeholders to deliver infrastructure change initiatives.
Highlights
Contributed to a secure data center strategy by supporting the design and delivery of a new active-active data center model, enhancing resilience and secure failover capabilities.
Enabled secure business innovation by aligning modern architecture patterns (cloud, integration, access controls) with internal policies and risk frameworks.
Closed security gaps in legacy and proposed solutions by identifying design weaknesses and recommending improvements, enhancing security posture and compliance.
Delivered architectural consultancy and security design input for infrastructure and platform changes, including data center migration and network segmentation.
Identified security and operational risks across proposed designs, providing mitigation and remediation guidance as part of technical assurance functions.
London, Greater London, United Kingdom of Great Britain and Northern Ireland
→
Summary
Remediated identified vulnerabilities via enterprise-wide security enhancements and contributed to IT and business transformation projects, focusing on GRC.
Highlights
Enabled data-driven governance by producing and maintaining actionable security metrics and dashboards, enhancing visibility for senior stakeholders and audit teams.
Supported successful remediation planning by assisting with the implementation of security action plans and collaborating with project and operational teams on control improvement initiatives.
Collaborated with technical specialists on data risk and security gap assessments to remediate identified vulnerabilities through enterprise-wide security enhancements.
Oversaw the implementation of best security practices and standards within networking infrastructure and systems, ensuring robust security posture.
Chelmsford, Essex, United Kingdom of Great Britain and Northern Ireland
→
Summary
Provided security engineering expertise for a public sector organization, focusing on system security and vulnerability management.
Highlights
Implemented and maintained security solutions to protect organizational assets.
Assisted in identifying and mitigating system vulnerabilities.
Contributed to security incident response activities and system hardening.
London, Greater London, United Kingdom of Great Britain and Northern Ireland
→
Summary
Delivered security engineering services as a contractor, focusing on client-side security implementations and support.
Highlights
Supported client security infrastructure, ensuring operational integrity and compliance.
Assisted with security configurations and troubleshooting for various systems.
Contributed to client security projects and initiatives, adhering to project timelines.
London, Greater London, United Kingdom of Great Britain and Northern Ireland
→
Summary
Managed and maintained network infrastructure for a global shipping company, ensuring high availability and performance.
Highlights
Designed, implemented, and maintained network systems, supporting global operations and connectivity.
Resolved complex network issues, minimizing downtime and ensuring business continuity for critical systems.
Managed network security configurations and access controls, enhancing data protection.
Contributed to network upgrade and optimization projects, improving system efficiency.
London, Greater London, United Kingdom of Great Britain and Northern Ireland
→
Summary
Administered network operations and systems for a travel company, focusing on user connectivity and system reliability.
Highlights
Administered network infrastructure, ensuring reliable connectivity for over 100 users.
Managed network access and security policies, maintaining data integrity.
Provided technical support for network-related issues, resolving 95% of tickets within 24 hours.
London, Greater London, United Kingdom of Great Britain and Northern Ireland
→
Summary
Provided technical support for network systems within a professional services firm, ensuring smooth operation and user satisfaction.
Highlights
Provided first-line support for network and system issues, resolving problems efficiently.
Assisted with network hardware and software installations and configurations.
Monitored network performance and identified areas for improvement, contributing to system stability.
Certificates
Skills
Governance, Risk & Compliance (GRC)
Governance Risk & Compliance (GRC), Third-Party Risk Management (TPRM), Policies & Standards, Security Gap Analysis & Control Assessments, Zero Trust Architecture, Risk Management & Assurance Testing, Incident Management, Documentation & Reporting, Stakeholder Engagement, Security Controls & Frameworks, Data Privacy & Regulatory Compliance, Secure by Design & Security Frameworks, Network & Information Systems (NIS).
Industry Frameworks & Standards
ISO 27001, NIST CSF, NIST 800-53, GDPR, PCI-DSS, CIS Controls.
Security Technologies
RSA Archer (GRC Platform & Risk Management), QRadar (SIEM & Log Review), Splunk (SIEM & Log Review), Active Directory (AD) (IAM), Entra ID (IAM), Cisco ISE (IAM), F5 (IAM), Qualys (Vulnerability Management), McAfee DLP (Data Privacy & Privacy Monitoring), Titus (Data Privacy & Privacy Monitoring), Azure Security Centre (Cloud Security), AWS Hub (Cloud Security), Firewalls, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Encryption Mechanisms.
Cloud Security
Cloud Native Security, AWS, Azure.
Core Cyber Security Domains
Network Security, Endpoint Security, Cloud Security.
Technical & Analytical Skills
Vulnerability Management, Analytical Thinking, Threat Modeling (STRIDE), Technical Risk Assessments, Secure Design Decisions.
Communication & Leadership
Strong Written & Verbal Communication, Convey Technical Issues to Non-Technical Audiences, Cross-functional Collaboration.