SC Cleared
Cyber SecurityCloud Architecture & GRC
Securing Cloud environments for Regulated and Critical Infrastructure Organisations:
- • Security architecture that works in production.
- • Azure & M365 security aligned to NCSC, NIST, ISO 27001
- • Governance that withstands external audit.
- • Audit readiness for Cyber Security Frameworks.
- • AI Security Governance and Audit.
Cyber Security Specialist
Cyber Security project delivery across Azure cloud environments.
Cloud Security
Delivery of robust protection and resilience across Azure and Microsoft cloud environments.
GRC Expertise
Outcome-focused GRC expert aligning security with business goals, compliance, and real-world resilience.
CNI Experience
Assuring high-stakes environments through structured risk management and defensible architecture.
Audit & Control Validation
Evidencing control maturity for internal audits, regulatory assessments, and external certifications.
Threat Detection Readiness
Microsoft Defender Suite and KQL-driven insights to stay ahead of emerging threats.
Security Strategy & Engagement
Translating complex security challenges into board-level outcomes with clarity and confidence.
Audio Introduction
Listen to a brief overview of my background and approach.
Consulting Expertise & Technical Capability
I deliver specialist cyber security and risk consultancy to enterprise and Critical National Infrastructure (CNI) clients, combining deep technical capability with strategic security expertise. My skillset is built on a proven foundation across Cloud Environments — including Azure Security Center, Sentinel, and Policy — and Microsoft 365 security Suite of tools and the securing of AI-driven automation including Copilot. This is underpinned by extensive experience aligining to recognised security frameworks including Cyber Essentials Plus, ISO 27001, and NIST CSF/CAF — ensuring organisations meet their regulatory obligations that demonstrate security maturity to stakeholders and regulators alike.
My GRC experience encompasses the design and implementation of policy, standards, and procedures, risk assessments and treatment plans, Information Security Policy, Security Controls assurance, framework alignment, and management of third-party Security Risk Assessments (SRA) — evaluating supplier and partner security postures to minimise organisational risk exposure. This end-to-end approach ensures clients maintain Defensible, Auditable Security Postures across their entire supply chain. Across SIEM & monitoring, I have deployed and optimised Microsoft Sentinel, Tenable One, and Azure Monitor & Log Analytics, leveraging KQL to deliver actionable Threat Intelligence and continuous visibility. My endpoint security expertise spans Microsoft Defender for Endpoint (MDE), Microsoft Purview, Data Loss Prevention (DLP), and Intune MDM — protecting devices, data, and identities at scale.
For clients requiring infrastructure resilience and automation, I have designed and implemented Infrastructure as Code solutions via Azure Resource Manager (ARM), automated patch management pipelines, and CIS-hardened builds. I deliver scripting and automation across PowerShell, Logic Apps, BASH, Python, SQL, and KQL, and translate complex security data into executive-ready reporting through Power BI, Power Automate, and AI Prompt Engineering.
Delivering end-to-end cyber security consultancy across governance, risk, and compliance — underpinned by deep technical capability across Microsoft security platforms, cloud infrastructure, and critical national infrastructure environments.
Governance
Microsoft 365
Security Frameworks
Client Projects
My history of Enterprise Client security projects.
Cyber Security Specialist
Sizewell C | Nuclear CNI
- Engage with internal and external partners to ensure services are secure by design.
- Audit vulnerabilities and provide actionable mitigation strategies.
- Conduct security reviews, risk assessments, and audits.
- Ensure compliance alignment with recognised industry frameworks.
- SC Cleared - Comfortable working in Highly Regulated Environments.
Security Consultant
Northern Power Grid | Electricity CNI
- Endpoint security controls within OT pre-production environment using Carbon Black EDR.
- Authored (HLD/LLD) security designs, contributing to defensible architecture.
- Delivered tailored application control baselines and custom EDR rule sets.
- Mentored internal teams on secure operations, post-project handover.
Infrastructure Security Engineer
Ineos Oil & Gas | Oil & Gas
- Delivery of a NIST-aligned cyber security program across IT and OT infrastructure.
- Oversaw onboarding of MSSP, SIEM (Dell SecureWorks), and tuning of IDS/IPS policies.
- Deployed enterprise EDR, DNS security (Carbon Black, Cisco Umbrella), and IAM controls (OKTA).
- Azure and O365 security architecture with hardened image deployments and automated patching.
- Projects delivered despite the covid shutdown.
Infrastructure Security Engineer
Kobalt Music Publishing | Media & Entertainment
- Deployed global EDR and SIEM solutions (Carbon Black, Splunk), enhancing detection and response.
- Onboarded IAM solutions (OKTA) and drove secure integration with AWS, Confluence, and JIRA.
- Hardened systems using CIS benchmarks, with automation of secure Windows 10 builds.
- Developed and enforced global security policies, procedures, and vulnerability management processes.
Network Systems Analyst
ACCOR Hotels UK & Ireland | Global Hospitality
- Delivered secure infrastructure support across 250+ sites during a major digital transformation, contributing to PCI DSS compliance across UK & European hotel networks.
- Migrated legacy Exchange to Office 365, enabling secure and scalable email infrastructure.
- Decommissioned legacy VPNs and coordinated secure firewall upgrades across 200+ Cisco devices.
- Implemented secure scripting, patching automation, and compliance monitoring using PowerShell, SCCM, and event log auditing.
Explore More Resources
Dive deeper into cybersecurity implementations, live monitoring, and expert guidance.
Case Studies
Visual showcase of cybersecurity implementations, security architecture diagrams, and project outcomes.
- Security architecture diagrams
- Compliance framework mappings
- Threat intelligence dashboards
- Real-world implementation examples
AI Assistant
Chat with an AI assistant trained on Brian's cybersecurity expertise. Discuss your project, assess fit, and get expert guidance.
- Ask about skills and experience
- Discuss your project requirements
- Pre-screen project fit
- Leave your contact details
Get in Touch
Interesting projects?
Get in touch to discuss how I can help in designing and implementing effective security controls across cloud environments and implementing effective GRC.
Contact Me
Get in touch to discuss your cybersecurity needs or ask questions about my services.