Demmy Adeyemo, Developer in London, United Kingdom
Demmy is available for hire
Hire Demmy

Demmy Adeyemo

Verified Expert  in Engineering

IT Security Architect and Developer

London, United Kingdom
Toptal Member Since
November 21, 2022

Demmy is an information security architect with numerous years of experience in systems and security architecture. He has worked with different vendor products and platforms to achieve a cohesive and in-depth defense strategy. A committed and pragmatic professional with good team spirit, Demmy delivers projects with tight schedules and proven client care.


NHS Test & Trace
Cloud Architecture, Cloud Security, IoT Security, Security, IT Security...
Freshfields Bruckhaus Deringer
Cloud Architecture, Cloud Security, IoT Security, Security, IT Security
Financial Conduct Authority
Cloud Architecture, Cloud Security, IoT Security, Security, IT Security, SMTP




Preferred Environment

Windows, MacOS, Linux, Amazon Web Services (AWS), Azure, Google Cloud Platform (GCP), Prisma, Terraform, GitHub, Embedded Systems, IoT Security, Internet of Things (IoT), Embedded C++, Embedded C

The most amazing...

...project I've been involved in is the development of the England and Wales NHS COVID-19 app that helped slow the spread of the virus and saved lives.

Work Experience

Senior Security Architect

2020 - 2022
NHS Test & Trace
  • Reviewed microservices processing exposure notification data to make sure they were configured securely. Ensured any personally identifiable information was discarded or tokenized at the source and did not traverse back-end systems.
  • Built security into development practices, such as securing main branches by requiring pull requests, SCA analysis on images used for containerization, statistical analysis on development code, and reviewing IaC templates for security settings.
  • Defined CI/CD pipelines for security engineering teams to provide products like a gold build operating system and updates, packaged host applications, e.g., endpoint detection and response (EDR), and clean images.
  • Made submissions to the ICO on data sets involving PII that explained the need for them and how they were protected and/or removed from systems.
Technologies: Cloud Security, Cloud Architecture, IoT Security, Security, IT Security, Microsoft 365

Domain Security Architect

2019 - 2020
Freshfields Bruckhaus Deringer
  • Integrated Active Directory (AD) with Azure AD using role-based access control (RBAC) and privileged identity management (PIM) to provide access to services and applications based on customer-managed roles and policies.
  • Used a network security group (NSG) and dFWs to secure VNets and NSX-T segments and monitor with proactive use cases using Azure monitor.
  • Used a security center to check for Azure resource compliance and implemented Sentinel as a security information and event management (SIEM) tool to monitor Azure and Microsoft 365 platforms.
  • Defined a software development lifecycle (SDLC) with a development test and pre-production and production environment, and a CI/CD pipeline. Also, I locked down code repositories linked to a respective environment controlled by RBAC policies.
Technologies: Cloud Architecture, Cloud Security, IoT Security, Security, IT Security

Security Architect

2018 - 2019
Financial Conduct Authority
  • Reviewed solution designs for AWS and Azure cloud migration based on the architecture blueprint, ensuring the right level of integration with cloud security tools and providing security sign-off as part of the cloud migration program.
  • Created an architecture repository, particularly a standard information base, to support documentation of policies, standards, guidelines, and best practices for project teams using infrastructure to deploy new solutions or remediate old ones.
  • Designed and implemented a vulnerability management program using Qualys to scan on-premise infrastructure and IaaS resources, Prisma to review serverless components, and feed findings into skybox to categorize vulnerabilities based on risk.
  • Implemented mail protection techniques using SPF and DKIM to authorize legitimate senders and DMARC policies to inform receivers on actions to take on senders that fail authentication.
Technologies: Cloud Security, Cloud Architecture, IoT Security, Security, IT Security, SMTP

Lead Security Architect

2016 - 2018
  • Set up a security advisory function and defined terms of engagement, triage, and assessment criteria to provide relevant security requirements to the project.
  • Built a pool of security requirements from ISO 27001, PCI DSS, GDPR, and COBIT 5.0 and mapped appropriate standards or policies within the organization.
  • Embedded security into the project management lifecycle by defining a security engagement process, signing off artifacts produced at each project gate, and determining security transition criteria to move the project into service.
  • Reviewed project technical documentation and proposed solution designs necessary to help meet information security requirements and regulations.
  • Designed a PCI DSS-compliant merchant network for over 300 stores globally to collect and process card payments.
  • Redesigned store networks to accommodate sales, corporate, and guest use, leveraging AWS for corporate resources.
Technologies: Cloud Architecture, Cloud Security, IoT Security, Security, IT Security

I was a member of a team that developed the British government's COVID-19 tracking app to slow the virus's spread by breaking the transmission chain. The app leveraged the GAEN framework, preserving citizen privacy while following a positive case exposure notification. It was built on a distributed architecture for ease of deployment, management, and portability. I oversaw the following:

• The security assurance of application architecture, implementation, and codebase.
• The security assurance of proposed features and assessment of each release.
• The adherence to data protection laws and upholding citizens' privacy rights.
• The security in the development pipeline.


Prisma, Terraform, GitHub, Shell


Windows, Amazon Web Services (AWS), MacOS, Linux, Azure, Google Cloud Platform (GCP), WordPress

Industry Expertise

Network Security, Cybersecurity, IT Security, Security


Amazon S3 (AWS S3)


Security Architecture, Risk Management, Vulnerability Management, PCI DSS, NIST Cybersecurity Framework, GDPR, Networking, SIEM, Endpoint Detection and Response (EDR), Encryption, Cryptography, Cloud Security, Cloud Architecture, Networks, IoT Security, Internet of Things (IoT), Microsoft 365, ISO 27001, CCNP Security, Solution Architecture, Sequence Read Archive (SRA) Data, Cisco, Palo Alto Networks, Web Security, Data Security, AWS DevOps, CI/CD Pipelines, Identity & Access Management (IAM), Embedded Systems, SMTP, Shell Scripting, AWS Cloud Architecture


YAML, Bash, Python 3, Embedded C++, Embedded C, Python


Windows PowerShell


DevSecOps, Management, Web Architecture

2010 - 2011

Master's Degree in Computer Systems and Networks

University of Bradford - Bradford, England, United Kingdom


Azure Security Engineer



AWS Security Specialty



Certified Ethical Hacker (CEH)



AWS Solutions Architect Associate




The Open Group


Splunk Consultant I



Certified Information System Security Professional (CISSP)