Invite Freelancer to Project
You don't seem to have an active project at the moment. Why not post a project now? It's free!Post a Project
- N/AJobs Completed
- N/AOn Budget
- N/AOn Time
- N/ARepeat Hire Rate
GDPR and Products ConsultantJan 2008 - Jan 2018 (10 years)
Managed GDPR Transition programme in collaboration with Information Security & other Team: work includes Assessment of current Data Privacy practices; Creation of a Data privacy Governance structure; Personal Information audit & Lawful processing; Creation/Updates Privacy Policies; I have implemented Agile/Scrum & served as Scrum Master. I’ve worked with resources in-house, virtually & external resources. Managing features requires more than understanding technical capabilities & launch sets.
MSc Secure Computer Systems2007 - 2008 (1 year)
BSc Computer Science2003 - 2005 (2 years)
Certified Information Systems Auditor (2006)ISACA
Information System Auditing
Cisco Certified Network Associate
SOftware Testing (2005)ISQTB/ISEB
Foundation Certificate in Software Testing
Prince2 Practitioner Certification & Foundation (2016)Axelos
PRINCE2 provides guidance that gives individuals and organisations the essentials of running a project. PRINCE2 is easy to learn and a flexible method that can adapt to all types of project.
ITIL Foundation certified (2016)Axelos
ITIL is the most widely accepted approach to IT service management in the world. ITIL can help individuals and organisations use IT to realise business change, transformation and growth.
GDPR Practitioner Certification & Foundation (2017)Knowledge Academy - BCS
The General Data Protection Regulation (GDPR) Practitioner course enables delegates to fulfil the role of data protection officer (DPO) under the EU GDPR, and covers the Regulation in depth.
Threat Assessment for a mobile ticketing systems
A detailed threat assessment for a mobile ticketing systems where users can use their mobile phone to purchase, receive and redeem the ticket. This includes the major threats to components ie mobile phone, mobile networks, servers and point redemptions systems. The publication also address the countermeasure to detect and prevent identified threats.