Nicholas Martin

Nicholas Martin

IT Security, Cyber Security & IAM

Based in London, I am a cybersecurity and IAM specialist with over 20 years of experience across security operations, identity governance, and infrastructure protection. I focus on GDPR alignment, encryption deployment, DDoS mitigation, and practical security architecture that delivers measurable risk reduction. Born in London in 1986, I hold a High School Diploma from the Advanced Technology Academy (Michigan) and a Diploma in Advanced IT from Lake Superior State University (2002–2004). I hold a CEH certification (2018) and am known for pragmatic problem‑solving and clear, win‑win outcomes.

Professional Journey

A 20+ year progression across IAM leadership, security architecture, and hands‑on delivery

2026 - Present

Senior IAM Engineer

Enterprise Transport & Travel

Designing and implementing IAM solutions to reduce risk, enforce least‑privilege access, and strengthen authentication controls in high‑availability environments.

  • Architected IAM controls aligned to security policy and compliance
  • Improved access governance and operational efficiency
  • Delivered secure onboarding for critical systems
  • Supported incident response and risk reduction initiatives
2022 - 2026

IAM Lead / Architect

Enterprise Insurance & Financial Services

Led IAM technical initiatives across enterprise environments, including privileged access management and identity lifecycle governance.

  • Delivered privileged access integration with CyberArk
  • Implemented role‑based access with Active Directory
  • Ran security audits and remediation improvements
  • Automated IAM processes to reduce operating cost
2021 - 2022

Active Directory Track Lead (Contract)

Energy & Utilities (London, UK)

Led AD design and migration work for enterprise-scale environments with high availability and security requirements.

  • Designed AD migration for 2,000+ users
  • Implemented group policies and security measures
  • Integrated AD with Exchange and SharePoint
  • Reduced AD risk through vulnerability assessments
2018 - 2021

IAM Technical Change (Contract)

Financial Services

Provided IAM design and delivery support across major programmes, integrating new systems into live IAM operations.

  • End‑to‑end identity lifecycle management
  • CyberArk integration and enhanced authentication
  • Process improvement aligned to security best practice
  • L3 escalation support and technical guidance
2018

GDPR Alignment Consultant (Contract)

Education & Care Services (London, UK)

Delivered GDPR-aligned infrastructure updates and migration planning for client environments.

  • Aligned infrastructure to GDPR requirements
  • Led Windows 10 and Office 365 migrations
  • Produced training and compliance documentation
2016 - 2017

IT Engineer / IT Security

Performing Arts & Events (London, UK)

Delivered enterprise migrations and patch management improvements across large user bases.

  • Office 365 migration for 900+ users
  • Windows 7–10 migration for 1,000+ devices
  • Built SCCM for automated patching
2015 - 2016

IT Engineer

Education (London, UK)

Supported multi‑tier IT operations, migrations, and end‑user enablement.

  • 1st–3rd line support for 700+ users
  • Exchange 2007 to Office 365 migration
  • Windows Vista/7/8.1 to 10 upgrades
  • Video conferencing upgrades

Core Expertise

Skills summary across security, infrastructure, automation, and AI

🛡️

Security & Compliance

  • IAM: AD, CyberArk (V7–V10), Entra PAM, AWS/Azure IAM
  • Least privilege, RBAC, privileged access
  • Pen testing: Kali, Metasploit, Nmap, Wireshark
  • Compliance: GDPR, SOC2, HIPAA, PCI‑DSS
  • Threat modelling & vulnerability assessments
  • Incident response, forensics, log monitoring
🔐

Infrastructure & Cloud

  • Windows Server 2003–2019, AD, Office 365
  • SQL Server, SCCM, VMware vSphere, Hyper‑V
  • Networking: DNS, DHCP, WAN, LAN, VPN, VLANs, RDS
  • Cloud: AWS & Azure (IAM, encryption)
  • Docker deployments on VPS
  • IP telephony: Mitel, Avaya, Genesys
🤖

Automation & DevOps

  • PowerShell automation
  • IaC basics (Terraform self‑study)
  • CI/CD exposure through migrations
  • Process automation & workflow design
☁️

Development & AI

  • Multi‑model AI for business operations
  • n8n workflows for automation
  • Linux/Unix (Debian, CentOS, Red Hat, Ubuntu)
  • Scripting and tooling for ops efficiency
CEH
Certified Ethical Hacker (2018)

Key Competencies

  • Clear communication of complex IT issues to non‑technical stakeholders
  • Problem resolution and quality assurance procedures
  • Security tooling, encryption deployment, and malware mitigation
  • Web content management systems
  • Team‑first delivery and stakeholder alignment

Beyond the Profession

Interests outside of work that balance focus and creativity

👥

Community & Family

Enjoys spending time with friends and family and staying connected to community.

💻

Coding & Engineering

Builds and tests security automation, prototype tools, and practical solutions.

🛠️

Pen Testing

Enjoys ethical security testing and hands‑on learning through real‑world scenarios.

📚

Continuous Learning

Keeps current with evolving threats, IAM trends, and security best practice.

Education

Lake Superior State University — Diploma in Advanced IT (2002–2004)

Advanced Technology Academy (Michigan) — High School Diploma

Professional Philosophy

"Security is not just about preventing threats—it's about enabling businesses to innovate with confidence. By combining decades of cybersecurity expertise with cutting-edge AI technology, we create solutions that don't just protect organizations, but empower them to thrive in an increasingly digital world."

My approach centers on understanding each organization's unique challenges and opportunities, then crafting tailored solutions that balance security, usability, and business objectives. Whether it's implementing zero-trust architecture, developing AI-powered threat detection, or training the next generation of security professionals, I'm committed to excellence in every engagement.