You got this far…read more about me
Here is a little more about who I am.
I have more than 20 years experience with IT, website development and business services.
Over the years I have worked with computer companies, setup numerous businesses from web-based companies to a few SEO businesses and a cyber security company. To date my work as led me to developing online business strategies, developing websites and working around information security systems/IT.
I have used a variety of system tools to help identify network threats within private corporate networks ranging from a few end points to over three hundred end points. I have used virtualisation technology, imaging of new PCs, planned the configuration of business networks and implement security technologies for example IDS, IPS systems. Implemented IP camera solutions and performed regular penetration tests of routers and servers. See below the range of systems I have used.
Snort IDS/IPS, cloud-based log management, Meraki (Cisco), SSL certificate configuration and management, Nessus, Wireshark, Nmap, Zenmap.
CISSP, ISO/IEC 27001, CompTIA Security+ (SYO-401), CEH, Juniper Networks JNCIS-ENT, CompTIA.
Ollydbg, WinBdg, GBD, IDA Pro, PEiD, malware sandbox
Wireshark/TCPView packet analysis, DNS servers, mail server.
Windows XP, Vista, 7, 8; Windows Server 2003, 2008, 2012; Linux including CentOS, Ubuntu, Arch, iOS, Mac OS, Debian, BackTrack, and Kali.
Ace practitioner. Covers Cyber Essentials and Cyber Essentials Plus, MCSE (2001).
FSB, CISP, EC Council.
I have a good understanding of the following
ISO 27001, GDPR compliance, IT Governance, ISO 9000, document management, business management and planning.
My interests to date are: Government, Literature, Film, Music, Business, Technology, Chemistry, Electronics, IT and Cyber Security.
If you’re looking for information on my work history, what I am doing now and who I work with, look me up on Linked in.
I work developing business models in the online sector.
Improved version of Cyber Essentials
As I have been approved as an Ace practitioner I found holes within the Cyber Essentials platform and developed a more robust system I use to audit a network, this falls in line with Cyber Essentials and ISO 27001. The system I have developed is more robust. ISO 27001 is a framework of policies and procedures that includes all legal, physical and technical controls involved in an organisation’s information risk management processes.
Technical and business
I’m able to work with within the confides of technical and business services. I have found this useful when it comes to GDPR as this fall in line in relation to combining technical and business systems.
Write a testimonial
All the testimonials on my website www.keith-griffiths.com are written by clients I have worked with.