
Professional Profile
Name: Adrian Anglin Role: Cybersecurity Manager | Security Strategy & Governance | Technical Leader Location: London, UK
Professional Summary
I am a Cybersecurity Manager with over a decade of experience bridging the gap between technical security operations and organisational risk strategy.
Unlike many in management who step away from the technology, I maintain deep technical fluency in offensive and defensive operations. This allows me to lead with authority—designing pragmatic security architectures, managing high-performance SOC teams, and translating complex technical threats into clear business risks for executive stakeholders.
Currently, I lead security initiatives that do not just "lock down" systems but enable business objectives by ensuring resilience, compliance, and operational continuity in hybrid cloud environments.
Certifications
I hold industry-standard credentials that validate both my management capabilities and technical expertise.
Management & Architecture
Technical & Operations
Cloud & Privacy
CISM (Certified Information Security Manager)
CEH (Certified Ethical Hacker)
CCSP (Certified Cloud Security Professional)
CISSP-ISSAP (Architecture Professional)
CHFI (Computer Hacking Forensic Investigator)
CDPSE (Data Privacy Solutions Engineer)
CISSP (Certified InfoSys Security Professional)
SC-200 Microsoft Certified: Security Operations Analyst Associate
SSCP (Systems Security Certified Practitioner)
Core Leadership Competencies
Strategic Program Management
Operational Transformation: Successfully migrated legacy on-premise SOCs to cloud-native architectures (Microsoft Sentinel), modernising detection capabilities while optimising operational budgets.
Governance & Compliance: Expert in aligning security roadmaps with frameworks like NIST CSF, ISO 27001, and CIS Controls to ensure audit readiness and regulatory compliance (GDPR, PCI DSS).
Risk Strategy: Leading enterprise-wide risk assessments and third-party risk management (TPRM) programs to quantify and reduce organisational exposure.
Security Operations Leadership
Incident Command: Acting as the primary escalation point and incident commander during high-severity breaches, coordinating containment, forensic investigation, and executive communication.
Team Development: Building and mentoring cross-functional security teams, fostering a culture of continuous learning and "purple team" thinking.
Threat Strategy: Directing proactive threat-hunting campaigns utilising MITRE ATT&CK to uncover persistent threats before they impact business continuity.
Technical Pedigree
My management style is grounded in hands-on experience. I understand the tools my team uses because I have mastered them myself.
SIEM & Analytics: Microsoft Sentinel, Splunk, and Defender XDR.
Forensics & IR: Velociraptor, Magnet AXIOM, Binalyze AIR, Autopsy.
Infrastructure: Secure Architecture for Azure Hybrid Clouds, Firewalls/IDS, and Zero Trust implementations.
Career Highlights
Strategic Leadership: Developed and executed an organisation-wide security initiative that measurably reduced the attack surface and increased phishing resilience across the workforce.
Operational Excellence: Managed global cybersecurity operations, implementing advanced threat-hunting workflows that moved the organisation from reactive alerting to proactive detection.
Executive Advisory: Regular trusted advisor to C-suite stakeholders, providing data-driven insights on operational risk and security investment ROI.
Education
M.Sc. Computing (Information Security) | The Open University (2023)
B.Sc. Computing & IT | The Open University (2019)
Last updated