Certifications
This page provides an overview of my professional certifications across cybersecurity leadership, security operations, cyber threat intelligence, and technical security domains.
These certifications complement my professional, academic, and research activities, reflecting a profile that combines governance-oriented leadership with hands-on technical understanding of modern cyber threats and defensive practices.
Executive Leadership and Security Governance
Certified Chief Information Security Officer (CCISO) – EC-Council
This certification strengthens competencies in cybersecurity leadership, risk management, governance frameworks, and the strategic alignment between information security and business objectives.
It is particularly relevant to executive-level responsibilities involving security governance, regulatory compliance, and enterprise-wide cyber risk management.
Cyber Threat Intelligence and Incident Response
Certified Threat Intelligence Analyst (CTIA) – EC-Council
Focused on the threat intelligence lifecycle, adversary profiling, intelligence collection and analysis, and the operational use of intelligence to support defensive decision-making.
Certified Incident Handler (ECIH) – EC-Council
Centered on incident detection, response coordination, containment strategies, and post-incident analysis, with emphasis on structured handling of cybersecurity incidents in enterprise environments.
Offensive Security and Technical Foundations
Certified Ethical Hacker (CEH) – EC-Council
Provides a structured foundation in offensive security methodologies, adversarial techniques, reconnaissance, exploitation logic, and defensive countermeasures.
Red Teaming Active Directory
Focused on Active Directory attack paths, privilege escalation, lateral movement, and attacker tradecraft in Windows-based enterprise environments.
This training contributes to a deeper understanding of adversarial behavior in identity-centric infrastructures and supports a more realistic approach to detection and defensive validation.
Security Monitoring and SIEM Platforms
IBM QRadar SIEM Foundation Certification – IBM
IBM QRadar SIEM Advanced Certification – IBM
These certifications are focused on the design, deployment, and advanced operational use of SIEM platforms for:
- log collection and normalization
- event correlation
- detection engineering
- enterprise security monitoring
- incident investigation workflows
They reinforce applied competencies in security monitoring and detection-oriented security operations.
Continuous Professional Development
These certifications should be understood as part of a broader and continuously evolving professional development path, supported by operational practice, academic activity, independent study, and ongoing alignment with changing regulatory and threat landscapes.