An Information Systems Security professional with experience in multiple domains of Information technology. Recent experience focuses on the establishment of an IT Risk Management function including IT Risk assessments of Third parties who also has a background in implementing Information security including policies, awareness, architecture, Identity Access Management including Role Based Access Control, Vulnerability Management, Technical Security Standards compliance management, Certificate Authority, Data Masking, Log Aggregation, Log Correlation, Log Monitoring, and Disaster Recovery and Vendor, Application and infrastructure Security Risk Assessments and Business Continuity Management. Also possess excellent project management skills blending technical knowledge and a solid coaching technique.