Cybersecurity GRC Intern | Security Assurance | Risk-Based Controls | Privacy-Driven TPRM
Risk-first GRC. I translate business impact into risk-based controls and evidence-backed vendor decisions, strengthening third-party risk (TPRM) and US privacy-focused vendor governance.
- Portfolio Index (Start Here): https://github.com/badrnkarim/portfolio-index
- TPRM (US Privacy + Cloud): https://github.com/badrnkarim/TPRM-US-Privacy-Cloud
- Multi-Framework GRC Portfolio (SDG): https://github.com/badrnkarim/grc-portfolio-sdg
- Secure Database Gateway (SDG) Showcase: https://github.com/badrnkarim/sdg-secure-db-gateway-showcase
- ISO 27001 ISMS Portfolio: https://github.com/badrnkarim/ISO27001-ISMS-GRC-Portfolio
- LinkedIn: https://www.linkedin.com/in/badrkarim/
Repo: https://github.com/badrnkarim/TPRM-US-Privacy-Cloud
A complete Third-Party Risk Management (TPRM) program pack focused on US privacy obligations and cloud vendor data protection, built with evidence discipline and decision-maker artifacts.
What it demonstrates:
- Privacy-heavy vendor governance: purpose limitation, minimization, retention/deletion, DSAR readiness
- Subprocessor governance and change review workflow
- Residual risk scoring tied to control maturity + evidence confidence
- Audit-ready evidence system (EV-INDEX + evidence artifacts) and remediation tracking
- Business decision layer: Executive Decision Brief, Approval Authority Matrix, Risk Committee brief
Repo: https://github.com/badrnkarim/grc-portfolio-sdg
A multi-framework assurance portfolio organized around risk-based controls and mapped across:
COBIT • NIST CSF 2.0 • ISO 27000 family • ISO 31000 • SOC 2 • ISO 37301
What it demonstrates:
- Risk → control alignment (impact-driven, not checklist-driven)
- Cross-framework mapping that reduces redundancy and improves coverage
- Assurance-style structure built for audit review and decision support
- Evidence mindset: controls are written to be testable, reviewable, and traceable
Repo: https://github.com/badrnkarim/sdg-secure-db-gateway-showcase
A complete, US-grade showcase repository demonstrating the Secure Database Gateway (SDG), functioning as a real-world security enforcement point.
What it demonstrates:
- Technical evidence of RBAC, Template-only SQL execution, and SSRF-safe validations
- Auditability proofs including log history, integrity snapshot verification, and tampering mismatch detection
- Professional security baseline (threat modeling, control matrix, and complete architectural documentation)
- Perfect mapping of conceptual security controls to operational UI evidence
Repo: https://github.com/badrnkarim/ISO27001-ISMS-GRC-Portfolio
An ISMS documentation portfolio structured for audit readiness and assurance review.
What it demonstrates:
- ISMS governance artifacts and disciplined documentation structure
- Risk handling logic and traceability (risk → controls → evidence)
- Evidence indexing mindset (proof-first organization)
- Internal audit / CAPA mindset (findings → remediation → verification)
I work like an assurance analyst: clear logic, clean traceability, and evidence-ready outputs.
- Risk assessment support: document threats, likelihood, and business impact to prioritize risk
- Risk-based controls: support selecting controls based on impact and control value
- Vendor risk (TPRM): support privacy/security requirements (retention/deletion, DSAR readiness, subprocessors) with enforceable evidence
- Framework mapping: align one control set across frameworks to maximize coverage
- Assurance documentation: structure tests + evidence so decisions survive review
- Evidence-based GRC – building portfolios that link controls to risks, policies, procedures and audit evidence.
- Cross-framework integration – mapping requirements from COBIT, NIST CSF 2.0, ISO 27000 family, ISO 31000, SOC 2 and ISO 37301 to minimize redundancy and maximize coverage.
- Audit preparedness & CAPA management – documenting control tests, managing corrective & preventive actions, and producing audit-ready evidence.
- Risk communication – translating technical risks into business language to support leadership decision-making.
- Vendor risk & privacy operations: purpose limitation, minimization, retention/deletion, DSAR readiness, subprocessors (TPRM)
- Governance & control objectives: COBIT
- Security outcomes: NIST CSF 2.0
- ISMS & controls: ISO 27001/27002 (+ ISO 27005 risk approach)
- Enterprise risk: ISO 31000
- Assurance reporting: SOC 2
- Compliance systems: ISO 37301
Risk → Control → Test → Evidence → Findings → CAPA → Verification
I keep each step traceable so a reviewer can answer:
- Why is this control needed?
- How is it validated?
- What evidence proves it works?
LinkedIn: https://www.linkedin.com/in/badrkarim/

