Ayhan Tek, Developer in Toronto, ON, Canada
Ayhan is available for hire
Hire Ayhan

Ayhan Tek

Verified Expert  in Engineering

Bio

Ayhan is a cyber security professional experienced in implementing and managing cyber security and DevSecOps programs. He has worked on security projects for different industries, handling virtual CISO, risk assessment and management, threat modeling, and security architecture, audit, and training. He is keen on using SAST and DAST security tools and handling governance, risk, and compliance issues. Ayhan is a CISSP, CISM, TOGAF, and ITIL-certified professional willing to embrace new projects.

Availability

Part-time

Preferred Environment

Information Security, Security, Compliance, PCI, CISO, CISSP, TOGAF, Cloud, Azure Active Directory, Cybersecurity

The most amazing...

...thing I've done was providing strategic, technical, and tactical guidance to implement and enhance end-to-end information security programs.

Work Experience

CISO, VP of Information Security

2019 - PRESENT
Cyber Electra
  • Implemented cyber security processes and technologies, providing strategic and tactical guidance on information security, privacy, and compliance programs.
  • Led the implementation of security technology projects, relying on my hands-on security and engineering background, and completed them within the allocated security budget.
  • Supported the leadership team and the board of directors in security, compliance, and privacy issues.
Technologies: Information Systems, Information Security, Information Audits, Web Security, IoT Security, Cloud Security, Application Security, Risk Management, Threat Modeling, Data Privacy, CISO, CISSP, CISM, ITIL, GRC, Identity & Access Management (IAM), Asset Management, SOC 2, NIST, ISO 27001, Security Audits, Azure Active Directory, Security, Cybersecurity, Windows

Security Program Management for a Benefits Carrier

Led the security architecture and program for a not-for-profit benefits carrier. I completed the implementation of security, privacy, and compliance projects within the scope of the company's security program. I also conducted threat risk assessments and privacy impact assessments.

DevOps Project for a Bank

I have implemented DevSecOps capabilities under the application security program at a well-known bank. Worked as the application security leader to implement secure SDLC and DevOps capabilities in the bank. It involved close collaboration with IT, development, executive management, operations, and QA stakeholders.

Security and Privacy Policy and Standards Creation

I developed governance, risk, and compliance-related security and privacy artifacts, including policy, standards, processes, and procedures. I also sat at international compliance bodies, such as IEEE, and contributed to creating ISO standards. The last one I developed was the DevOps Standard, and I'm currently working on the Configuration Standard (SBOM).
1985 - 1991

Bachelor's Degree in Engineering

METU | Middle East Technical University - Ankara, Turkey

SEPTEMBER 2017 - PRESENT

Certified Information Security Manager (CISM)

ISACA

JULY 2017 - PRESENT

Service-oriented Architecture

SOA Systems

JUNE 2017 - PRESENT

ITIL Foundation Certified

ITIL

MAY 2016 - PRESENT

The Open Group Architecture Framework (TOGAF)

Open Group

JANUARY 2013 - PRESENT

CISSP – Certified Information Systems Security Professional

(ISC)²

JUNE 2002 - PRESENT

Sun Certified Java Developer

Sun Microsystems

Languages

Java

Frameworks

TOGAF, .NET

Paradigms

DevOps, HIPAA Compliance, ITIL, DevSecOps

Platforms

Azure, Amazon Web Services (AWS), Windows

Storage

Azure Active Directory

Industry Expertise

Cybersecurity

Other

Information Security, Information Security Management Systems (ISMS), Compliance, PCI, SOC 2, CISO, CISSP, Cloud, Information Systems, Web Security, Cloud Security, Application Security, Risk Management, Threat Modeling, CISM, GRC, Identity & Access Management (IAM), Asset Management, NIST, ISO 27001, Security Audits, Enterprise Architecture, Software Development, Security Architecture, Security Management, Incident Management, Cryptography, IT Governance, Security Design, Security, Information Audits, IoT Security, Data Privacy, Engineering, IT, Budget Management, Service, Architecture, Agile DevOps, Technical Design, Web Technologies, ISO Standards

Collaboration That Works

How to Work with Toptal

Toptal matches you directly with global industry experts from our network in hours—not weeks or months.

1

Share your needs

Discuss your requirements and refine your scope in a call with a Toptal domain expert.
2

Choose your talent

Get a short list of expertly matched talent within 24 hours to review, interview, and choose from.
3

Start your risk-free talent trial

Work with your chosen talent on a trial basis for up to two weeks. Pay only if you decide to hire them.

Top talent is in high demand.

Start hiring