Edward Berkoh

Accredited Information Security Professional
Sutton, GB.

About

Highly experienced and accredited Information Security Professional with over a decade of expertise in supporting Governance, Risk, and Compliance (GRC) functions across highly regulated sectors. Proven ability to apply key principles from frameworks like ISO 27001, NIST CSF, PCI-DSS, and GDPR to assess control effectiveness, manage risk registers, and drive audit readiness. Adept at cross-functional collaboration and strategic alignment of security practices with business and regulatory expectations.

Work

CLS Group
|

Information Security Architect (Contract)

London, Greater London, United Kingdom of Great Britain and Northern Ireland

Summary

Played a pivotal role in strengthening organizational security governance by aligning business objectives with information security policies and regulatory requirements, providing oversight and assurance throughout project delivery lifecycles.

Highlights

Improved compliance posture across multiple programs by aligning all project security activities with ISO 27001, NIST CSF/800-53, and CIS controls, significantly reducing audit findings.

Strengthened design assurance by integrating policy compliance checks and control validations throughout the project lifecycle, leading to early identification and resolution of non-conformities.

Increased stakeholder confidence by delivering traceable, evidence-based assurance documentation, enhancing support for critical security decisions and demonstrating due diligence.

Defined and implemented robust security requirements aligned with ISO 27001, NIST CSF/800-53, CIS controls, and GDPR, ensuring comprehensive regulatory adherence.

Consulted on new designs by performing STRIDE threat modeling, proactively identifying risks and recommending effective mitigating controls.

Harbour Energy
|

Security SME (Contract)

London, Greater London, United Kingdom of Great Britain and Northern Ireland

Summary

Supported the implementation of business solutions by ensuring compliance with information security policies, regulatory requirements, and governance standards across key technology domains.

Highlights

Led technical security risk assessments and advised on control enhancements, significantly strengthening the enterprise's defence-in-depth strategy.

Improved stakeholder visibility of risk by ensuring key risks were documented, clearly communicated, and tracked for remediation within the enterprise risk register.

Influenced system and architecture design through GRC oversight, ensuring alignment with internal security policies, ISO 27001 controls, and regulatory standards.

Conducted comprehensive risk assessments on proposed solutions and architectural changes, identifying security risks and ensuring appropriate stakeholder visibility.

Utilized STRIDE threat modeling for business-critical systems, identifying threats and ensuring comprehensive control coverage across processes and data flows.

TATA Consultancy Services (TCS)
|

Information Security Consultant - Deutsche Bank (Contract)

London, Greater London, United Kingdom of Great Britain and Northern Ireland

Summary

Supported information security functions by ensuring governance and assurance of security controls, and managing risks in line with Deutsche Bank's enterprise risk framework and compliance objectives.

Highlights

Reduced compliance gaps by supporting Risk and Control Self-Assessments (RCSA), identifying weaknesses, and escalating unresolved control issues for timely review.

Accelerated remediation timelines by facilitating risk acceptance and mitigation planning with business stakeholders, significantly reducing open policy exceptions across key domains.

Planned and conducted assurance testing for RCSA, documenting findings and recommending effective mitigation actions.

Prioritized assurance coverage based on risk exposure, focusing efforts on high-impact areas to enhance audit readiness and regulatory alignment.

Provided security oversight and risk guidance for IT projects, evaluating technical controls and policy adherence to ensure compliance.

HCL Technologies UK
|

Security Architect – Old Mutual Wealth (Contract)

London, Greater London, United Kingdom of Great Britain and Northern Ireland

Summary

Supported secure infrastructure transformation across Old Mutual's business units by partnering with project teams and stakeholders to deliver infrastructure change initiatives.

Highlights

Contributed to a secure data center strategy by supporting the design and delivery of a new active-active data center model, enhancing resilience and secure failover capabilities.

Enabled secure business innovation by aligning modern architecture patterns (cloud, integration, access controls) with internal policies and risk frameworks.

Closed security gaps in legacy and proposed solutions by identifying design weaknesses and recommending improvements, enhancing security posture and compliance.

Delivered architectural consultancy and security design input for infrastructure and platform changes, including data center migration and network segmentation.

Identified security and operational risks across proposed designs, providing mitigation and remediation guidance as part of technical assurance functions.

Hewlett Packard Technology Outsourcing
|

GRC Analyst (Contract)

London, Greater London, United Kingdom of Great Britain and Northern Ireland

Summary

Remediated identified vulnerabilities via enterprise-wide security enhancements and contributed to IT and business transformation projects, focusing on GRC.

Highlights

Enabled data-driven governance by producing and maintaining actionable security metrics and dashboards, enhancing visibility for senior stakeholders and audit teams.

Supported successful remediation planning by assisting with the implementation of security action plans and collaborating with project and operational teams on control improvement initiatives.

Collaborated with technical specialists on data risk and security gap assessments to remediate identified vulnerabilities through enterprise-wide security enhancements.

Oversaw the implementation of best security practices and standards within networking infrastructure and systems, ensuring robust security posture.

Essex County Council
|

Security Engineer (Contract)

Chelmsford, Essex, United Kingdom of Great Britain and Northern Ireland

Summary

Provided security engineering expertise for a public sector organization, focusing on system security and vulnerability management.

Highlights

Implemented and maintained security solutions to protect organizational assets.

Assisted in identifying and mitigating system vulnerabilities.

Contributed to security incident response activities and system hardening.

Yatcom Solutions Ltd
|

Security Engineer (Contract)

London, Greater London, United Kingdom of Great Britain and Northern Ireland

Summary

Delivered security engineering services as a contractor, focusing on client-side security implementations and support.

Highlights

Supported client security infrastructure, ensuring operational integrity and compliance.

Assisted with security configurations and troubleshooting for various systems.

Contributed to client security projects and initiatives, adhering to project timelines.

Gearbulk UK Ltd
|

Network Engineer (Permanent)

London, Greater London, United Kingdom of Great Britain and Northern Ireland

Summary

Managed and maintained network infrastructure for a global shipping company, ensuring high availability and performance.

Highlights

Designed, implemented, and maintained network systems, supporting global operations and connectivity.

Resolved complex network issues, minimizing downtime and ensuring business continuity for critical systems.

Managed network security configurations and access controls, enhancing data protection.

Contributed to network upgrade and optimization projects, improving system efficiency.

Sunshare Vacations
|

Network Administrator (Permanent)

London, Greater London, United Kingdom of Great Britain and Northern Ireland

Summary

Administered network operations and systems for a travel company, focusing on user connectivity and system reliability.

Highlights

Administered network infrastructure, ensuring reliable connectivity for over 100 users.

Managed network access and security policies, maintaining data integrity.

Provided technical support for network-related issues, resolving 95% of tickets within 24 hours.

William M. Mercer
|

Network Support Analyst (Permanent)

London, Greater London, United Kingdom of Great Britain and Northern Ireland

Summary

Provided technical support for network systems within a professional services firm, ensuring smooth operation and user satisfaction.

Highlights

Provided first-line support for network and system issues, resolving problems efficiently.

Assisted with network hardware and software installations and configurations.

Monitored network performance and identified areas for improvement, contributing to system stability.

Education

University (Inferred)
United Kingdom of Great Britain and Northern Ireland

Bachelor of Science (BSc)

Computer Science

Certificates

Certified Information Systems Security Professional (CISSP)
Certified Information Security Manager (CISM)
Certified in Risk and Information Systems Control (CRISC)
EC-Council Certified Ethical Hacker (CEH)
Control Objectives for Information Related and Technology (COBIT)
Cisco Certified Network Professional (CCNP)
Cisco Certified Design Associate (CCDA)

Skills

Governance, Risk & Compliance (GRC)

Governance Risk & Compliance (GRC), Third-Party Risk Management (TPRM), Policies & Standards, Security Gap Analysis & Control Assessments, Zero Trust Architecture, Risk Management & Assurance Testing, Incident Management, Documentation & Reporting, Stakeholder Engagement, Security Controls & Frameworks, Data Privacy & Regulatory Compliance, Secure by Design & Security Frameworks, Network & Information Systems (NIS).

Industry Frameworks & Standards

ISO 27001, NIST CSF, NIST 800-53, GDPR, PCI-DSS, CIS Controls.

Security Technologies

RSA Archer (GRC Platform & Risk Management), QRadar (SIEM & Log Review), Splunk (SIEM & Log Review), Active Directory (AD) (IAM), Entra ID (IAM), Cisco ISE (IAM), F5 (IAM), Qualys (Vulnerability Management), McAfee DLP (Data Privacy & Privacy Monitoring), Titus (Data Privacy & Privacy Monitoring), Azure Security Centre (Cloud Security), AWS Hub (Cloud Security), Firewalls, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Encryption Mechanisms.

Cloud Security

Cloud Native Security, AWS, Azure.

Core Cyber Security Domains

Network Security, Endpoint Security, Cloud Security.

Technical & Analytical Skills

Vulnerability Management, Analytical Thinking, Threat Modeling (STRIDE), Technical Risk Assessments, Secure Design Decisions.

Communication & Leadership

Strong Written & Verbal Communication, Convey Technical Issues to Non-Technical Audiences, Cross-functional Collaboration.