Cybersecurity · GRC · ISO 27001 · IS Audit · IT Support · Network Security
MSc IT & Applied Security (London Metropolitan University) — Results-driven professional with expertise across IS audit, GRC, ISO 27001, NOC operations, and IT support. Fortinet NSE · (ISC)² CC · ISO 27001 Internal Auditor · GDPR · Azure · Active Directory. Seeking IT Support, Help Desk, NOC, or Cybersecurity roles in Australia.
I am a cybersecurity and IT professional with over 5 years of combined experience in IS audit, network operations, technical support, and security governance. I hold an MSc in Information Technology & Applied Security (specialisation: Computer Networking & Cybersecurity) from Islington College — London Metropolitan University, completed 2025.
Recognised as Employee of the Year 2024 (March 12, 2024) by Managing Director Narayan Koirala at Eminence Ways Pvt. Ltd — a cybersecurity firm — I single-handedly led IS audit engagements across Class A banks, insurance companies, ISPs, IT firms, and government bodies. I hold Fortinet NSE1/NSE2, (ISC)² CC, ISO 27001 Internal Auditor, GDPR, Cisco CyberOps, and ISO/IEC 42001 credentials.
My technical stack spans Windows Server, Active Directory, Microsoft 365, Azure, Hyper-V, VMware, Veeam, Nagios, iMaster NCE, Palo Alto, CrowdStrike, Sophos — giving me the governance depth and infrastructure credibility rare in the security profession.
My MSc dissertation — "Securing Insurance Companies: A Strategic Approach to ISO 27001 – ISMS Implementation" (0% plagiarism) — reflects my passion for translating standards into real organisational resilience. Now in Perth, WA with full working rights, I am targeting IT Support, Help Desk, NOC, Cybersecurity, or GRC leadership roles.
London Metropolitan University, 2025. Networking & Cybersecurity specialisation.
Fortinet Certified Fundamentals in Cybersecurity — network security expertise.
Certified Internal Auditor (Advisera). Hands-on ISMS implementation experience.
Azure, AD, Windows Server, Hyper-V, VMware, Veeam, Microsoft 365.
London Metropolitan University. Computer Networking & Cybersecurity. Dissertation: ISO 27001 ISMS for Insurance Companies (0% plagiarism).
London Metropolitan University / Islington CollegeAI governance, risk management, and ethical AI deployment frameworks. UKAS accredited.
UKAS — United Kingdom Accreditation ServiceGovernance, Risk, and Compliance — cybersecurity risk frameworks, regulatory compliance, enterprise GRC strategy.
LinkedIn LearningISO 27001:2022-Compliant Cybersecurity: Getting Started & Annex A Controls — updated control framework and gap assessment.
LinkedIn LearningFoundation Level — two courses covering data subject rights, controller obligations, lawful basis, and breach notification.
Aim Training Academy & Fit4PrivacyComprehensive ISO 27001 Internal Auditor course — audit planning, execution, reporting aligned to ISO/IEC 27001 ISMS standards.
Advisera (training.advisera.com)Data protection principles, rights, lawful basis, and compliance requirements under EU regulation.
AdviseraOfficial (ISC)² self-paced training — exam passed. Validates cybersecurity fundamentals across risk, network security, and incident response.
(ISC)² InternationalComprehensive CISA preparation — IS audit process, IT governance, systems acquisition, development, and protection.
LinkedIn LearningThree-course Cisco cybersecurity programme — network security operations, threat analysis, intrusion detection, and SOC fundamentals.
Cisco Networking AcademyFortinet network security certifications — threat landscape, cybersecurity concepts, and Fortinet security fabric architecture.
Fortinet Training InstituteNext priority — validates ability to plan, lead, and manage ISMS audits per ISO/IEC 27001. Key credential for senior IS Audit and GRC leadership.
PECB / BSIStrategic approach to ISO 27001 ISMS implementation for insurance sector organisations. Covered threat landscape, risk methodology, gap analysis, SoA mapping, Annex A control selection, and a practitioner-ready implementation roadmap. 0% plagiarism.
Public GitHub repository containing a 93-control Annex A checklist, risk register template, Statement of Applicability (SoA) template, and audit evidence guide. Licensed CC BY 4.0 — open source for the security community.
Academic research on IoT cybersecurity — VPNFilter malware analysis, Vercada IoT breach case study, 8-stage attack lifecycle, and privacy-preserving frameworks. Published through CC7178NI Cyber Security Management module. 0% plagiarism.
Led comprehensive IS audit engagements for Class A banks. Assessed ITGC: user access management, change management, IT operations, and application controls aligned to ISO 27001, NIST, and central bank directives. Coordinated board-level meetings and delivered formal reports.
Public repository of structured cybersecurity study notes covering ISO 27001, GDPR, GRC fundamentals, network security, and certification preparation for (ISC)² CC, CISA, and Fortinet NSE. Available for the security learning community.
Implemented firewall rule optimisation, VLAN segmentation, and CIS Benchmark-aligned hardening across ISP backbone infrastructure. Configured Nagios and iMaster NCE monitoring. Reduced incident recurrence 40% through structured RCA. Developed NOC workflows and technical documentation.
Lessons from the MSc dissertation — step-by-step ISMS implementation from gap analysis to Annex A control mapping in insurance sector contexts.
A practitioner's overview of the UKAS-certified AI Management System Standard — why AI governance matters for ISMS and GRC programmes in 2025.
Governance, Risk, and Compliance are not checkbox exercises — they are the strategic backbone of a resilient security posture. Perspectives from IS audit practice.
Research-backed analysis of two major IoT breach case studies — lessons for network defenders, auditors, and security architects.
Critical ITGC areas that consistently surface audit findings — access reviews, change management, and more from real IS audit experience in Nepal.
A practical certification roadmap — how to sequence NSE, (ISC)² CC, ISO 27001, CISA, CRISC, and CISSP for maximum career impact in the Australian market.
"Yadav consistently demonstrated exceptional professionalism. His ability to manage complex IS audit engagements across multiple sectors — single-handedly — while maintaining the highest reporting standards was outstanding. His ISO 27001 knowledge is genuinely applied, not theoretical."
"His presentation skills in conveying cybersecurity concepts to non-technical board members were remarkable. Yadav has a rare gift for translating complex audit findings into clear business risk language — exactly what leadership teams need."
Available for IT Support, Help Desk, NOC, Cybersecurity, and GRC roles. Open to ISO 27001 consulting, IS audit advisory, and speaking engagements. Perth WA — full working rights, available immediately.
For job opportunities, consulting projects, ISO 27001 advisory, or speaking engagements. Responds within 24–48 hours.
Ask questions about ISO 27001, GRC frameworks, and audit best practices — AI-powered chatbot.
Q3 2025Self-assessment tool to benchmark ISMS readiness against all Annex A controls for organisations.
Q3 2025Interactive CMMI / NIST CSF maturity assessment tool for SMEs and mid-market organisations.
Q4 2025Direct calendar integration for booking advisory calls and project discovery sessions online.
Q3 2025Upload your CV and get feedback on positioning for IT support and cybersecurity leadership roles.
Q4 2025Educational content on ISO 27001, GRC fundamentals, Fortinet, and IS audit career guidance.
2026Conference talks and webinars on cybersecurity governance, GRC strategy, and IoT security.
2026Monthly cybersecurity governance updates, framework news, and IS audit career tips for subscribers.
2026