Banner Image

Skills

  • Compliance Consulting
  • Cyber Security
  • Information Security Writing
  • ISO 27001
  • Security Consulting
  • Technical Blog Writing

Services

  • Cybersecurity and GRC Analsyis

    $25/hr Starting at $250 Ongoing

    Dedicated Resource

    I provide Cybersecurity Governance, Risk, and Compliance (GRC) and ISO-aligned security services to help organizations establish, assess, and strengthen their security posture in line with international...

    Compliance ConsultingCyber SecurityInformation Security WritingISO 27001Security Consulting

About

Cybersecurity GRC & ISO 27001 (ISMS) Specialist helping organizations manage risk, achieve compliance, and build practical, business-aligned security governance they can trust.

I am a Cybersecurity professional specializing in Governance, Risk, and Compliance (GRC) and ISO-aligned security frameworks, with a strong academic foundation and hands-on experience in security risk analysis, policy development, and compliance readiness.

I hold degrees in Computer Science (BSc, MSc) and I am currently pursuing a PhD in Cybersecurity, with research focused on regulatory frameworks and security risk management within the financial and public sectors. This background allows me to approach cybersecurity not only from a technical perspective, but also from governance, regulatory, and business-risk viewpoints.

Professionally, I support organizations in identifying security gaps, assessing risks, and aligning their controls with international best practices such as ISO/IEC 27001 and ISO 27002, as well as widely accepted cybersecurity and risk management frameworks. My work includes security risk assessments, ISO gap analysis, policy and procedure review, compliance documentation, and audit readiness support.

I am particularly skilled at translating complex security and compliance requirements into clear, actionable guidance that management teams and non-technical stakeholders can understand and implement. Rather than delivering generic checklists or automated scan results, I focus on practical, tailored solutions that address real operational risks and support long-term security maturity.

My values are professionalism, confidentiality, accuracy, and continuous improvement. I approach every project with attention to detail and a strong sense of responsibility, understanding that cybersecurity and compliance decisions have real business and reputational impact.

Outside of client work, I am deeply interested in cybersecurity research, regulatory policy, and capacity building. I enjoy learning, mentoring, and staying current with evolving security standards and threat landscapes. I am especially motivated by projects that help organizations build sustainable security governance rather than short-term compliance fixes.

I am open to working with startups, SMEs, consultancies, and organizations seeking reliable cybersecurity GRC and ISO support delivered with integrity, clarity, and professionalism.

Work Terms

Hours of Operation:
I am available for client work Friday to Monday, with flexible scheduling to accommodate different time zones. Weekdays availability can be arranged when required for urgent or deadline-driven projects.

Payment Terms:
I work on an hourly or fixed-price basis, depending on project scope and complexity. Clear milestones, deliverables, and expectations are agreed upon before work begins. Payments are handled securely through the Guru platform to ensure transparency and protection for both parties.

Communication Style:
I value clear, professional, and timely communication. I prefer structured communication with defined objectives, written summaries, and documented requirements to ensure accuracy and accountability. I respond promptly and provide regular progress updates throughout the project lifecycle.

Preferred Communication Channels:
Communication via Guru messaging is preferred for record-keeping and clarity. Video or voice calls can be scheduled when necessary for discussions, reviews, or walkthroughs.

Working Approach:
I take a structured, methodical approach to every engagement—beginning with understanding the client’s business context, followed by risk assessment, analysis, and practical recommendations. Confidentiality and data protection are treated as top priorities at all times.

Attachments (Click to Preview)