• Experience in Security Architecture related services for IT systems and business applications
• Experience in various sectors, including finance,telecommunications, oil and gas
• Proven ability to identify process and control weaknesses and develop practical, acceptable
solutions to problems
• An experienced and highly motivated professional with over a decade experience in Designing
and implementing Security Reference Architectures, Data Protection and Privacy, Security
Designing, Trusted Computing Infrastructure, Cryptography, Access Controls, Systems and
Database Administration gained in UK, Germany, Australia and Singapore. I have successfully
managed virtual teams to deliver services to major blue chip Fortune 500 organizations.
• Skilled strategist who transforms strategic plans into workable security solutions.
• Proven track record of delivering optimal results in large high growth complex environments through
initiatives that exceed operational performance targets and yield measurable outcome.
Security Architect @ From October 2009 to June 2015 (5 years 9 months) London, United KingdomDatabase Security Engineer @ From February 2008 to September 2009 (1 year 8 months) Database Administrator @ From October 2007 to February 2008 (5 months) Sr Support Engineer @ From August 2005 to October 2007 (2 years 3 months) London, United KingdomDatabase Administrator @ From May 2005 to October 2005 (6 months) LondonDatabase Administrator @ From October 2004 to May 2005 (8 months) Leeds, United KingdomDatabase Administrator @ From June 2004 to September 2004 (4 months) LondonSystem and Database Administrator @ From April 2004 to June 2004 (3 months) London
Master's Degree, Software and Systems Security @ University of Oxford From 2012 to 2014 Master's Degree, Systems Auditing @ London Metropolitan University From 2007 to 2009 Hassan Altaf is skilled in: Risk Assessment, ISO 27001, PCI DSS, Network Security, Enterprise Architecture, Oracle, Linux, Governance, Risk Analysis, Cryptography, Cloud Security, Enterprise Security, Data Privacy, Trusted Computing..., Computer Forensics, Solaris, HP-UX, Compliance, IT Governance, Business Analysis, Security Architecture..., Amazon Web Services..., Public Key Cryptography, Identity and Access..., Threat Modeling, Disaster Recovery, Integration, Telecommunications, Infrastructure, Management, ITIL, Security