Skip to content
View warwickbrownteya's full-sized avatar

Block or report warwickbrownteya

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
warwickbrownteya/README.md

Warwick Brown

Acting Head of Security Engineering CISSP CCSP CSSLP

πŸ—οΈ Security Engineering Leadership

graph TB
    ORG["🏒 Payment Acquiring<br/>Merchant Bank"]

    ORG --> ROLE["I Lead<br/>Security Engineering"]

    ROLE --> DOMAIN1["🎯 Compliance &<br/>Regulatory"]
    ROLE --> DOMAIN2["🚨 Incident<br/>Response"]
    ROLE --> DOMAIN3["πŸ—οΈ Governance &<br/>Architecture"]
    ROLE --> DOMAIN4["πŸ”§ Security<br/>Architecture"]

    style ORG fill:#374151,color:#ffffff,stroke:#000000,stroke-width:2px
    style ROLE fill:#dc2626,color:#ffffff,stroke:#000000,stroke-width:3px
    style DOMAIN1 fill:#0d47a1,color:#ffffff,stroke:#000000,stroke-width:2px
    style DOMAIN2 fill:#c41e3a,color:#ffffff,stroke:#000000,stroke-width:2px
    style DOMAIN3 fill:#6a1b9a,color:#ffffff,stroke:#000000,stroke-width:2px
    style DOMAIN4 fill:#00695c,color:#ffffff,stroke:#000000,stroke-width:2px
Loading

"Leading security engineering for regulated payment infrastructure through formal governance frameworks, incident response, and strategic compliance architecture"

πŸš€ Current Role

Acting Head of Security Engineering at Teya

  • πŸ‘₯ Lead security engineering team (2 principal engineers, 1 senior engineer)
  • 🏦 Manage security for regulated payment acquiring merchant bank
  • πŸ“‹ Ensure compliance: PCI-DSS, PCI-PIN, PCI-MPOC, PCI-SDL, ISO 27001/27002, GDPR, NIS2
  • πŸ›‘οΈ Direct incident response and regulatory audit processes
  • πŸ—οΈ Architect formal governance frameworks and compliance infrastructure
  • πŸ”„ Interface with CISO, security director, GRC leadership, and IT leadership

πŸ“Š Regulatory & Compliance Scope

graph TB
    ORG["🏒 Payment Acquiring<br/>Merchant Bank"]

    ORG --> PCI["Payment Card<br/>Standards"]
    ORG --> INFO["Information<br/>Security"]
    ORG --> EU["EU<br/>Regulations"]

    PCI --> PCI1["PCI-DSS"]
    PCI --> PCI2["PCI-PIN"]
    PCI --> PCI3["PCI-MPOC"]
    PCI --> PCI4["PCI-SDL"]

    INFO --> ISO1["ISO 27001"]
    INFO --> ISO2["ISO 27002"]

    EU --> GDPR["GDPR"]
    EU --> NIS2["NIS2"]

    PCI1 --> YOU["My Responsibility:<br/>Compliance Assurance<br/>Audit Management<br/>Incident Direction"]
    PCI2 --> YOU
    PCI3 --> YOU
    PCI4 --> YOU
    ISO1 --> YOU
    ISO2 --> YOU
    GDPR --> YOU
    NIS2 --> YOU

    style ORG fill:#374151,color:#ffffff,stroke:#000000,stroke-width:2px
    style YOU fill:#dc2626,color:#ffffff,stroke:#000000,stroke-width:3px
    style PCI fill:#0d47a1,color:#ffffff,stroke:#000000,stroke-width:2px
    style INFO fill:#0d47a1,color:#ffffff,stroke:#000000,stroke-width:2px
    style EU fill:#0d47a1,color:#ffffff,stroke:#000000,stroke-width:2px
    style PCI1 fill:#ffffff,color:#000000,stroke:#1f2937
    style PCI2 fill:#ffffff,color:#000000,stroke:#1f2937
    style PCI3 fill:#ffffff,color:#000000,stroke:#1f2937
    style PCI4 fill:#ffffff,color:#000000,stroke:#1f2937
    style ISO1 fill:#ffffff,color:#000000,stroke:#1f2937
    style ISO2 fill:#ffffff,color:#000000,stroke:#1f2937
    style GDPR fill:#ffffff,color:#000000,stroke:#1f2937
    style NIS2 fill:#ffffff,color:#000000,stroke:#1f2937
Loading

πŸ‘€ Professional Focus & Expertise

Primary Domains:
  - Payment Services Security (PCI-DSS, PCI-PIN, PCI-MPOC, PCI-SDL)
  - Regulated Financial Institution Security
  - Governance & Compliance Frameworks
  - Incident Response & Management
  - Information Security Management (ISO 27001/27002)
  - EU Regulatory Compliance (GDPR, NIS2)
  - Team Leadership & Development

Technical Expertise:
  Governance & Architecture:
    - Formal governance frameworks
    - Semantic web & RDF/N3 ontologies
    - Distributed systems & microservices
    - Authority delegation & access control

  Cloud & Infrastructure:
    - AWS, GCP, Azure
    - Kubernetes & container orchestration
    - Terraform & infrastructure as code
    - HashiCorp Vault

  Security Operations:
    - Incident management systems
    - SIEM & monitoring (ELK, Splunk, Prometheus/Grafana)
    - Compliance automation
    - Threat detection & response

  Formal Methods:
    - SAT/SMT solvers
    - First-order logic & theorem proving (Coq, Lean)
    - Protocol analysis (Tamarin)
    - Post-quantum cryptography (NIST FIPS 204)

🌱 Current Focus

  • Zero Trust Architecture implementation
  • NIS2 & GDPR compliance operational excellence
  • Formal methods applied to security governance
  • AI/ML integration in security operations
  • Team development & mentoring

πŸ” My Security Operations Model

graph TB
    A["🚨<br/>Detection"]
    B["πŸ“Š<br/>Classification"]
    C["⚑<br/>Response<br/>Orchestration"]
    D["πŸ“‹<br/>Notification &<br/>Documentation"]
    E["βœ“<br/>Resolution"]
    F["πŸ“š<br/>Continuous<br/>Improvement"]

    A --> B
    B --> C
    C --> D
    D --> E
    E --> F

    G["πŸ—οΈ Governance<br/>Framework"]
    H["πŸ“ˆ Metrics &<br/>Monitoring"]

    G -.->|Guides| C
    H -.->|Feeds| A

    style A fill:#ffffff,color:#000000,stroke:#1f2937,stroke-width:2px
    style B fill:#ffffff,color:#000000,stroke:#1f2937,stroke-width:2px
    style C fill:#dc2626,color:#ffffff,stroke:#000000,stroke-width:3px
    style D fill:#ffffff,color:#000000,stroke:#1f2937,stroke-width:2px
    style E fill:#ffffff,color:#000000,stroke:#1f2937,stroke-width:2px
    style F fill:#ffffff,color:#000000,stroke:#1f2937,stroke-width:2px
    style G fill:#0d47a1,color:#ffffff,stroke:#000000,stroke-width:2px
    style H fill:#00695c,color:#ffffff,stroke:#000000,stroke-width:2px
Loading

πŸ“š Architectural Projects

πŸ›οΈ Security Governance Framework

  • Formal governance & authority models with RDF/Notation3 ontologies
  • Authority delegation & approval tracking systems
  • Compliance automation across governance modules
  • Tech: RDF/N3, formal semantics, Python automation

πŸ“‹ Incident Management System

  • Organizational incident tracking & response
  • Formal incident command structure
  • GDPR/NIS2 breach notification workflows
  • Audit trail & evidence management
  • Tech: Semantic web, governance automation, structured logging

πŸ” Compliance Infrastructure

  • Multi-standard compliance automation (PCI-DSS, ISO 27001, GDPR, NIS2)
  • Automated control verification
  • Audit preparation & reporting
  • Regulatory requirement mapping
  • Tech: Infrastructure as code, policy automation

πŸŽ“ Certifications & Training

  • CISSP (ISCΒ²) - Certified Information Systems Security Professional
  • CCSP (ISCΒ²) - Certified Cloud Security Professional
  • CSSLP (ISCΒ²) - Certified Secure Software Lifecycle Professional
  • Regulatory expertise: PCI-DSS, PCI-PIN, ISO 27001/27002, GDPR, NIS2

🎯 My Expertise Areas

Leadership & Management

graph TB
    CENTER["🎯 I Lead<br/>Security Engineering"]

    CENTER --> L1["πŸ‘₯ Team<br/>Development"]
    CENTER --> L2["πŸ“Š Strategic<br/>Direction"]
    CENTER --> L3["🀝 Stakeholder<br/>Coordination"]

    style CENTER fill:#dc2626,color:#ffffff,stroke:#000000,stroke-width:3px
    style L1 fill:#ffffff,color:#000000,stroke:#1f2937,stroke-width:2px
    style L2 fill:#ffffff,color:#000000,stroke:#1f2937,stroke-width:2px
    style L3 fill:#ffffff,color:#000000,stroke:#1f2937,stroke-width:2px
Loading

Compliance & Governance

graph TB
    CENTER["πŸ“‹ Compliance &<br/>Governance"]

    CENTER --> C1["πŸ“‹ Multi-Standard<br/>Frameworks"]
    CENTER --> C2["βš™οΈ Compliance<br/>Automation"]
    CENTER --> C3["βœ“ Audit & Evidence<br/>Management"]

    style CENTER fill:#0d47a1,color:#ffffff,stroke:#000000,stroke-width:2px
    style C1 fill:#ffffff,color:#000000,stroke:#1f2937,stroke-width:2px
    style C2 fill:#ffffff,color:#000000,stroke:#1f2937,stroke-width:2px
    style C3 fill:#ffffff,color:#000000,stroke:#1f2937,stroke-width:2px
Loading

Operations & Response

graph TB
    CENTER["🚨 Operations &<br/>Response"]

    CENTER --> O1["🚨 Incident<br/>Response"]
    CENTER --> O2["πŸ” Detection<br/>Engineering"]
    CENTER --> O3["πŸ“’ Breach<br/>Notifications"]

    style CENTER fill:#c41e3a,color:#ffffff,stroke:#000000,stroke-width:2px
    style O1 fill:#ffffff,color:#000000,stroke:#1f2937,stroke-width:2px
    style O2 fill:#ffffff,color:#000000,stroke:#1f2937,stroke-width:2px
    style O3 fill:#ffffff,color:#000000,stroke:#1f2937,stroke-width:2px
Loading

Technical Architecture

graph TB
    CENTER["πŸ”§ Technical<br/>Architecture"]

    CENTER --> T1["πŸ”¬ Formal Methods"]
    CENTER --> T2["πŸ•ΈοΈ Semantic Web"]
    CENTER --> T3["πŸ—οΈ Distributed Systems"]
    CENTER --> T4["☁️ Cloud Infrastructure"]

    T1 --> T1D["SAT/SMT<br/>Theorem Proving"]
    T2 --> T2D["RDF/N3<br/>Ontologies"]
    T3 --> T3D["Microservices<br/>Architecture"]
    T4 --> T4D["AWS/GCP/Azure"]

    style CENTER fill:#00695c,color:#ffffff,stroke:#000000,stroke-width:2px
    style T1 fill:#ffffff,color:#000000,stroke:#1f2937,stroke-width:2px
    style T2 fill:#ffffff,color:#000000,stroke:#1f2937,stroke-width:2px
    style T3 fill:#ffffff,color:#000000,stroke:#1f2937,stroke-width:2px
    style T4 fill:#ffffff,color:#000000,stroke:#1f2937,stroke-width:2px
    style T1D fill:#f3f4f6,color:#000000,stroke:#1f2937,stroke-width:1px
    style T2D fill:#f3f4f6,color:#000000,stroke:#1f2937,stroke-width:1px
    style T3D fill:#f3f4f6,color:#000000,stroke:#1f2937,stroke-width:1px
    style T4D fill:#f3f4f6,color:#000000,stroke:#1f2937,stroke-width:1px
Loading

πŸ› οΈ Technical Proficiency

Security Leadership Governance & Compliance Formal Methods Cloud Architecture Semantic Web Incident Management Team Leadership

πŸ“« Connect With Me

Contact available through professional networks


Focus Areas: Payment Services Security | Governance & Compliance | Incident Response | Team Leadership | Formal Methods

#infosec #cybersecurity #fintech #paymentsecurity #compliance #pcidss #gdpr #nis2 #securityengineering #governance


πŸ’‘ Leading security engineering at scale in regulated financial services environment

Popular repositories Loading

  1. warwickbrownteya warwickbrownteya Public

    Acting Head of Security Engineering | Payment Services Security | PCI-DSS, GDPR, NIS2 Compliance | Governance & Incident Response

  2. vscode-extension-n3 vscode-extension-n3 Public

    Forked from william-vw/vscode-extension-n3

    JavaScript

  3. Notation3-By-Example Notation3-By-Example Public

    Forked from eyereasoner/Notation3-By-Example

    Example N3 scripts to demonstrate the various built-in functions

    Shell

  4. swap swap Public

    Forked from linkeddata/swap

    The Semantic Web Application Platform: cwm etc

    Python

  5. rdflib rdflib Public

    Forked from RDFLib/rdflib

    RDFLib is a Python library for working with RDF, a simple yet powerful language for representing information.

    Python

  6. arm-boot-loader arm-boot-loader Public

    C