Nicholas Martin
IT Security, Cyber Security & IAM
Based in London, I am a cybersecurity and IAM specialist with over 20 years of experience across security operations, identity governance, and infrastructure protection. I focus on GDPR alignment, encryption deployment, DDoS mitigation, and practical security architecture that delivers measurable risk reduction. Born in London in 1986, I hold a High School Diploma from the Advanced Technology Academy (Michigan) and a Diploma in Advanced IT from Lake Superior State University (2002–2004). I hold a CEH certification (2018) and am known for pragmatic problem‑solving and clear, win‑win outcomes.
Professional Journey
A 20+ year progression across IAM leadership, security architecture, and hands‑on delivery
Senior IAM Engineer
Enterprise Transport & Travel
Designing and implementing IAM solutions to reduce risk, enforce least‑privilege access, and strengthen authentication controls in high‑availability environments.
- Architected IAM controls aligned to security policy and compliance
- Improved access governance and operational efficiency
- Delivered secure onboarding for critical systems
- Supported incident response and risk reduction initiatives
IAM Lead / Architect
Enterprise Insurance & Financial Services
Led IAM technical initiatives across enterprise environments, including privileged access management and identity lifecycle governance.
- Delivered privileged access integration with CyberArk
- Implemented role‑based access with Active Directory
- Ran security audits and remediation improvements
- Automated IAM processes to reduce operating cost
Active Directory Track Lead (Contract)
Energy & Utilities (London, UK)
Led AD design and migration work for enterprise-scale environments with high availability and security requirements.
- Designed AD migration for 2,000+ users
- Implemented group policies and security measures
- Integrated AD with Exchange and SharePoint
- Reduced AD risk through vulnerability assessments
IAM Technical Change (Contract)
Financial Services
Provided IAM design and delivery support across major programmes, integrating new systems into live IAM operations.
- End‑to‑end identity lifecycle management
- CyberArk integration and enhanced authentication
- Process improvement aligned to security best practice
- L3 escalation support and technical guidance
GDPR Alignment Consultant (Contract)
Education & Care Services (London, UK)
Delivered GDPR-aligned infrastructure updates and migration planning for client environments.
- Aligned infrastructure to GDPR requirements
- Led Windows 10 and Office 365 migrations
- Produced training and compliance documentation
IT Engineer / IT Security
Performing Arts & Events (London, UK)
Delivered enterprise migrations and patch management improvements across large user bases.
- Office 365 migration for 900+ users
- Windows 7–10 migration for 1,000+ devices
- Built SCCM for automated patching
IT Engineer
Education (London, UK)
Supported multi‑tier IT operations, migrations, and end‑user enablement.
- 1st–3rd line support for 700+ users
- Exchange 2007 to Office 365 migration
- Windows Vista/7/8.1 to 10 upgrades
- Video conferencing upgrades
Core Expertise
Skills summary across security, infrastructure, automation, and AI
Security & Compliance
- IAM: AD, CyberArk (V7–V10), Entra PAM, AWS/Azure IAM
- Least privilege, RBAC, privileged access
- Pen testing: Kali, Metasploit, Nmap, Wireshark
- Compliance: GDPR, SOC2, HIPAA, PCI‑DSS
- Threat modelling & vulnerability assessments
- Incident response, forensics, log monitoring
Infrastructure & Cloud
- Windows Server 2003–2019, AD, Office 365
- SQL Server, SCCM, VMware vSphere, Hyper‑V
- Networking: DNS, DHCP, WAN, LAN, VPN, VLANs, RDS
- Cloud: AWS & Azure (IAM, encryption)
- Docker deployments on VPS
- IP telephony: Mitel, Avaya, Genesys
Automation & DevOps
- PowerShell automation
- IaC basics (Terraform self‑study)
- CI/CD exposure through migrations
- Process automation & workflow design
Development & AI
- Multi‑model AI for business operations
- n8n workflows for automation
- Linux/Unix (Debian, CentOS, Red Hat, Ubuntu)
- Scripting and tooling for ops efficiency
Key Competencies
- Clear communication of complex IT issues to non‑technical stakeholders
- Problem resolution and quality assurance procedures
- Security tooling, encryption deployment, and malware mitigation
- Web content management systems
- Team‑first delivery and stakeholder alignment
Beyond the Profession
Interests outside of work that balance focus and creativity
Community & Family
Enjoys spending time with friends and family and staying connected to community.
Coding & Engineering
Builds and tests security automation, prototype tools, and practical solutions.
Pen Testing
Enjoys ethical security testing and hands‑on learning through real‑world scenarios.
Continuous Learning
Keeps current with evolving threats, IAM trends, and security best practice.
Education
Lake Superior State University — Diploma in Advanced IT (2002–2004)
Advanced Technology Academy (Michigan) — High School Diploma
Professional Philosophy
"Security is not just about preventing threats—it's about enabling businesses to innovate with confidence. By combining decades of cybersecurity expertise with cutting-edge AI technology, we create solutions that don't just protect organizations, but empower them to thrive in an increasingly digital world."
My approach centers on understanding each organization's unique challenges and opportunities, then crafting tailored solutions that balance security, usability, and business objectives. Whether it's implementing zero-trust architecture, developing AI-powered threat detection, or training the next generation of security professionals, I'm committed to excellence in every engagement.