About

Who I am.

I've always been into tech; I grew up building computers with my dad. I remember building my first PC with him when I was about 7 and playing Call of Duty 4: Modern Warfare. Actually, playing it so much my dad bought me an Xbox 360 Arcade so he could have his computer back! Since then, my whole life has been a battle with wanting the newest shiniest toys and understanding when you don't actually need them.

I did a lot of silly things as a teenager. I had a DL380 G7 in my parents' cupboard running game servers for me and my friends (that was noisy). Got banned from my school's network for six months when I found out how to get into the registration system (the groups folder was public, what could I say). Me and my best friend used to use an IR blaster to turn the projectors off in Spanish class. One time I ran an ethernet cable through my parents' house, downstairs, up through the floor, while they were out for the day. In hindsight, doing something in tech was always going to find me and it turned out to be Cyber Security.

My journey into Cyber Security started straight out of college when I was 20 at CyberFit Security, a small local outfit where the SOC was being run by a single guy called Joseph. With me joining but knowing nothing Cyber Security, that made it a 1.5-person team! I got thrown in the deep end, on my first day Joseph said "here's an incident, give it a go" with no other context. Turns out that was just a bit of fun at my expense, but how was I to know, this was my first "real job" experience.

Eventually, with some time and training, we became a proper (as proper as two people can be) two-person SOC, triaging thousands of alerts a month. Our client base ran across finance, education, energy, you name an industry, we probably dealt with it. Week-on/week-off on-call, which works surprisingly well when there's only two of you. A small part of me misses those days, but it was a hard lesson. There's no gentle introduction to the industry when it's just you and one other person; you learn fast or you fall behind.

In 2023 after two years with CyberFit we merged with Meridian IT via TUPE, partnering with a larger MSP to grow the client base and build a proper MSSP managed SOC service from scratch. I'm talking the full monty: KQL detections, runbooks, reporting templates, processes, RCA docs, onboarding procedures, frameworks, the lot. More clients, more scrutiny, more process, but the core work was still SOC, still triage, still investigation.

About a year in I took over as the senior escalation point, which was the first time I had to think beyond my own queue. Owning detection quality, mentoring juniors through SC-200 prep, maintaining the runbook library, being the person the rest of the team came to when things got weird. I liked it, teaching is its own kind of problem-solving.

After that I got the chance to jump across to the Cyber Security Engineering team for 16 months on a greenfield CNI programme, CIS Level 2 hardening across the estate, HA firewall pairs, internal PKI, out-of-band management, site acceptance testing, production handover. The whole lifecycle from design doc to sign-off. It was a deliberate detour, and easily the most useful stretch of my career so far. You see the same security problems from a completely different angle when you're the one building the thing.

End of 2025 the project wrapped, and I came back to the SOC as Manager, inherited a team of five, and spent the first few months rebuilding the commercial framework, the old time-allocation model was untraceable, and it was costing us. Day-to-day I still sit as the senior technical escalation point. I will always and forever be a technical body; that's a key part of the job I don't want to lose.

Long-term I want to end up as a Security Architect. I've always cared about growing and learning and knowing how infrastructure is built is a real edge for anyone working in detection. You can't detect what you don't understand, and the best SOC work I've seen comes from people who know the infrastructure well enough to predict where it'll break.

Journey
Dec 2025 — Now
SOC Manager
Meridian IT

Redesigned the SOC operating model and commercial framework. Leading a team of five across a regulated customer estate.

Aug 2024 — Dec 2025
Cyber Security Engineer
Meridian IT

Greenfield CNI programme on behalf of a UK energy operator — CIS Level 2 hardening, OPNsense HA firewall pairs, internal PKI, out-of-band management, full SAT sign-off against NCSC CAF and NIST CSF.

Feb 2024 — Aug 2024
Senior Cyber Security Analyst
Meridian IT

Sole operational ownership of the managed SOC. Built the detection runbook library, trained junior analysts, moved a regulated finance customer onto Recorded Future.

Feb 2023 — Feb 2024
Cyber Security Analyst
Meridian IT

Built the managed SOC service from scratch — detection queries, runbooks, reporting templates. Scaled across finance and education customers.

Feb 2021 — Feb 2023
Cyber Security Analyst
CyberFit Security

First role out of college. Two-person SOC, ~2,000 alerts a month across finance, education, and energy. Week-on/week-off on-call throughout.

Certifications
CISSP
ISC2
In progress
SC-200 · Security Operations Analyst Associate
Microsoft
2021
Google Cybersecurity Professional Certificate
Coursera
2023
Jira Fundamentals
Atlassian
2024
L3 Extended Diploma · Computer Science
Milton Keynes College
2021
If you've got something worth talking about.
Get in touch directly or via the contact page.
Get in touch →