I'm an experienced Information Security Manager with 19 years in IT infrastructure, enterprise security, and project management across multiple IT domains. I specialize in building strong security controls, creating clear and standardized documentation, and defining key performance and risk indicators (KCIs and KRIs) to protect organizational assets.
I’m skilled in identifying risks, designing effective security strategies, and ensuring compliance with industry regulations. My work includes developing detailed processes that improve consistency and strengthen the overall security posture.
By monitoring KCIs and KRIs, I help teams understand how security measures are performing and support proactive risk management. I combine strong analytical thinking with a collaborative approach to drive improvements and maintain high security standards.
· Engaged with second-line risk teams to identify security control gaps and process deficiencies in alignment with organisational information security standards, and ensured findings were documented in the risk register along with remediation actions, ownership assignment, and defined timelines
· Led the implementation of scheduled anti-malware scans across endpoints, servers, and ATMs, addressing compliance gaps and mitigating malware risks.
· Established anti-malware controls for Linux systems, collaborating with second and third line of defence to register and resolve risks in the enterprise risk register.
· Identified and remediated a process gap by integrating anti-malware access controls within Identity Access Management (IAM), ensuring alignment with ICS standards.
· Analysed and recertified legacy Host Firewall rules with respective owners to enhance tool performance and ensure security policies remained effective and up to date.
· Designed and implemented a governance framework for continuous monitoring, ensuring security processes and controls are recertified annually to maintain effectiveness and compliance.
· Reviewed existing processes and security controls for alignment with ICS standards, updated documentation, and redefined Key Control Indicators (KCIs) & Key Risk Indicators (KRIs) as part of the Risk Control Self-Assessment (RCSA) process.
· Acted as the primary point of contact during Group Internal Audits, managing audit-related queries and delivering detailed responses with supporting documentation for malware protection processes..
· Validated and responded to audit-related queries from regulators such as HKMA, NESA, MAS, and RBI, providing solid evidence to support compliance.
· Automated security product coverage & compliance reports using Power BI, providing management with valuable insights for informed decision-making.
Security Engineer – McAfee Solutions
Key Contributions:
Cybersecurity strategy