"Security is not a product, but a process; and governance is the architecture that makes it sustainable."
I am a Governance, Risk & Compliance (GRC) Engineer and cybersecurity subject matter expert with deep specialization in designing, implementing, and maturing enterprise security programs across highly regulated industries including finance, healthcare, and critical infrastructure.
My work bridges the gap between executive risk strategy, regulatory compliance obligations, and technical security control implementation β translating complex frameworks into actionable, auditable programs that survive scrutiny from both regulators and adversaries.
π Domains β Enterprise Risk Β· Compliance Engineering Β· Security Architecture Β· Audit & Assurance
ποΈ Frameworks β NIST CSF/RMF Β· ISO 27001/27002 Β· SOC 2 Β· PCI-DSS v4 Β· HIPAA Β· FedRAMP Β· CIS v8
π― Focus β Control Design Β· Compliance Automation Β· Third-Party Risk Β· Policy Governance
|
|
|
Regulatory & Compliance Frameworks
Threat Intelligence & Attack Frameworks
GRC & Security Tools
| Repository | Description | Focus |
|---|---|---|
| π§ grc-framework-toolkit | End-to-end implementation guides for NIST CSF 2.0, ISO 27001:2022 & RMF β with gap analysis templates, implementation roadmaps, and control mapping matrices | NIST ISO-27001 FedRAMP |
| Enterprise risk register templates, FAIR quantitative models, STRIDE/PASTA threat modeling playbooks, and BIA frameworks ready for production use | FAIR Threat-Modeling Risk-Register |
|
| π€ compliance-automation | Python-based compliance scanners, SOC 2 & ISO 27001 automated checklists, evidence collection scripts, and continuous compliance monitoring pipelines | SOC2 Python Automation |
| π security-policy-library | 40+ enterprise-grade security policy templates mapped to NIST CSF, ISO 27001 & CIS Controls β including AUP, ISMS Policy, Access Control, IR, and Vendor Risk | Policy Governance Templates |
| π cybersecurity-audit-toolkit | Internal audit programs, control testing workpapers, SOC 2 evidence request lists, and audit report templates aligned to IIA standards | Audit SOC2 Control-Testing |
| πΊοΈ mitre-attack-grc-mapping | Comprehensive mapping of MITRE ATT&CK Enterprise techniques to NIST SP 800-53, ISO 27001 Annex A, and CIS Controls v8 β with detection and mitigation guidance | MITRE ATT&CK Control-Mapping |
| Certification | Issuing Body | Domain |
|---|---|---|
| Certified Information Security Manager (CISM) | ISACA | Security Management |
| Certified Information Systems Auditor (CISA) | ISACA | Risk Management |
| ISO/IEC 27001:2013 Lead Auditor | TUV-SUD | ISMS Auditing |
| ISO/IEC 42001:2023 Lead Auditor | TUV-SUD | AIMS Auditing |
I am always open to discussing enterprise GRC strategy, security program design, compliance automation, and the intersection of cybersecurity with business risk. Reach out for collaboration, speaking engagements, or advisory work.