I assist clients in cyber security implementations by identifying risks and vulnerabilities to information security, translating these to requirements, proposing counter measures and designing secure solutions to mitigate the risks.