Details
Skills
Cybersecurity Governance, Risk & Compliance (GRC)
Enterprise Risk Management (ERM)
IT General Controls (ITGC)
Cybersecurity Policy, Standards & Procedures
Control Design & Control Effectiveness Reviews
Audit Readiness (Internal & External)
Regulatory & Framework Alignment
NIST Cybersecurity Framework (CSF)
NIST 800-53
ISO/IEC 27001
SOC 2 Type II
STRIDE Threat Modeling
OWASP Top 10
Cybersecurity Risk Assessments
Threat & Risk Assessments (TRA)
Third-Party Risk Management (TPRM)
Vendor Risk Assessments
Inherent & Residual Risk Analysis
Risk Registers & Risk Heatmaps
Remediation Planning & Tracking
Application Security Assessments
Threat Modeling (STRIDE)
Secure SDLC Reviews
Security Architecture Review Support
Enterprise Security Awareness Programs
Phishing Awareness & Campaign Design
Security Training & Workshops
Human Risk Management
Policy Awareness & Compliance Training
KPIs & KRIs Development
Cyber Risk Dashboards
Executive & Board-Level Reporting
Risk Trend Analysis
Behavioral Risk Metrics
RSA Archer (GRC)
Microsoft Threat Modeling Tool
Qlik Sense
Alteryx
Jira, Rally
Microsoft Excel, PowerPoint
Cloud Security Fundamentals (Azure)
Identity & Access Management (IAM) Concepts