Cyber.
Security.

Consulting.

Regulations.

IT Audit.

Governance.

Architecture.

Compliance.

Advisory.

Contracting.

• The average cost of a data breach was $4.45 million in 2023, the highest average on record. - IBM
• • The cyber security market is projected to grow by 10% to $10.5 trillion annually by 2025. - McKinsey

View My WorkContact Me

About Me

Know Me More

Hi, I'm Jake Eliasz

I'm a Cyber Security Professional dedicated to enhancing global safety by safeguarding businesses against ever-evolving cyber threats. Since 2005, I’ve assisted organizations worldwide in managing compliance and securing their critical assets. With two decades of experience spanning diverse industries, I’ve developed extensive expertise across various cyber security domains.

Linkedin TopVoice

Consulted in over:

50+ Countries

Delivered:

350+ Security Projects

Dual Citizenship:

EU | UK Passport Holder

Certified Professional:

10+ Security Certifications

What do I do?

How I can help your next project

Core Services PDF

Resume

A summary of My Resume

My Education

Master of Science (MSc) in Information Security

University of Plymouth, UK / 2005 - 2007

Final Thesis: ‘The pattern analysis of the IPS sensors across the campus network.’


Bachelor of Engineering (BEng) in Computer Science

University of KW, Poland / 2000 - 2005

Final Thesis: ‘Simple picture recognition using Artificial Intelligence (AI).’


Cyber Security Certifications*:

CISSP - Certified Information Systems Security Professional (ISC2)

ISSAP - Information Systems Security Architecture Professional (ISC2)

CCSP - Certified Cloud Security Professional (ISC2)

CISA - Certified Information Systems Auditor (ISACA)

C|CISO - Certified Chief Information Security Officer (EC-Council)

CEH - Certified Ethical Hacker (EC-Council)

PCI QSA - Qualified Security Assessor (PCI DSS, SSF, P2PE, 3DS, TSP)

*Credly hosts the largest and most-connected digital credential network. Please click the icon below to verify my cyber security certifications.

Credly

My Previous Experience

Head of Compliance Services (Europe)

NCC Group / 2015 - 2023

Reporting to the Global Head of Compliance – point of contact (SME) for the compliance service line development and management in Europe, including strategy, growth and the service line’s team members development.


Principal Security Consultant

Ambersail Audit Experts / 2010 - 2015

Reporting to MD – security team lead, conducting a full range of security assessments and consultancy services globally in over 50+ countries. This includes but not limited to security audits, risk assessments, security architecture (including cloud), incident response planning, acting Virtual CISO and many others.


Information Security Specialist

NMI Group / 2008 - 2010

Reporting to CISO – designing, deploying and maintaining an enterprise class network across multiple physical sites (USA/UK) with 200+ nodes, including hardening OS, IAM systems, DLP systems, backup solutions, anti-malware solutions and many others.

Cyber Security Skills

Frameworks & Standards 95%

Application Security (SDLC) 85%

Risk Assessment 88%

End-user Awareness Training 90%

Compliance and Audit 100%

Governance 95%

Security Architecture 82%

Physical Security Controls85%

Download CV

Interested in working with me?

Hire Me!  Follow

FAQ

Have any questions?

Protecting your business, one regulation at a time - Cipherlex specialises in cyber security compliance services to keep your business secure and compliant. Cipherlex offers a range of cyber security services globally via cost-effective B2B contracts either directly or by a network of partners.

Majority of Cipherlex customers are located in the EMEA region, in the EU and UK. A PDF brochure highlighting core services offered by Cipherlex can be downloaded from here.

GRC consulting firms help organisations protect their information assets from cyber threats by assessing their cybersecurity posture, developing security strategies and policies and implementing security controls and technologies.

I offer cost effective services at the highest quality. My global experience, gathered over the last 20 years across many sectors, maniftests itself in high level of knowledge in most of the cyber security domains. I value detailed and professional deliverables. A PDF brochure highlighting core services offered by Cipherlex can be downloaded from here.

Cipherlex is all about consultancy, without any added complexities. A simple project flow is used for small projects that have relatively straightforward requirements and minimal complexity.

However, it can be adapted and scaled up for larger and more complex projects by adding additional stages or breaking down each stage into more detailed sub-stages.

My day rates are competitively priced and offer cost-effective solutions compared to larger consulting firms. Day rates vary depending on the size, location and complexity of each project. You can contact me at hello@cipherlex.com to discuss your requirements in greater detail.

Yes, I do work onsite globally, if required. However, to reduce the project cost, majority of activities are completed from one of the Cipherlex offices, either in Warsaw (Poland) or in London (UK). Please reach out at hello@cipherlex.com to discuss your requirements in more detail.
faq

Recommendations

Clients & Colleagues Speak


Note. All testomonials included above have been published on the LinkedIn platform.

Let's get in touch

I enjoy discussing new projects and design challenges. Please share as much info, as possible so I can get the most out of our first catch-up.

Offices:

Warsaw, PL • London, UK

Email:

hello@cipherlex.com

Chat:

Cipherlex whatsapp

Legal Note:

Cipherlex is a registered legal entity under the EU Company Law (CRN 5542412753)
Full Terms and Conditions can be downloaded from here.

Cipherlex certifications

Estimate your Project

To estimate a project accurately, I need the following information:

1. Project Scope: Detailed description of what you want to achieve.
2. Project Timeline: Desired deadline or timeline for project completion.
3. Technical Specifications: Any specific technical requirements or platforms involved.
4. Communication and Collaboration: Preferred communication channels and availability for meetings.
5. Budget: Understand your budget or range of financial expectations.
6. Project Constraints: Identify any limitations or factors that may impact the project.

Download Section:

Cipherlex | Core Services Brochure

Cipherlex | Terms and Conditions

Cipherlex | 2024 Resume

ISSAP Study Plan QSA Study Plan