Document Review – Exceptional Promise (Cybersecurity)
Hello,
I would appreciate guidance as I prepare to submit my endorsement application under Exceptional Promise in Cybersecurity. I am seeking support on how best to categorise my evidence and assess whether it is sufficient.
My primary focus within Cybersecurity is Identity and Access Management (IAM), with particular emphasis on using Microsoft security solutions to protect organisations, users, and endpoints.
Recommendation Letters
I currently have three recommendation letters from recognised professionals in the field:
- A Professor of Cybersecurity who served as my academic tutor during my master’s degree in the UK.
- A Cybersecurity professional and mentor I connected with through my active engagement in the Women in Cybersecurity (WiCyS) UK & Ireland community and have done some projects with her within the past two years.
- My Master’s degree research supervisor, who was also the Head of my department during my MSc in Cybersecurity.
Academic Qualifications, Certifications, and Professional Memberships
Academic Qualifications
- Master’s Degree in Cybersecurity – Distinction (2024)
- Bachelor’s Degree in Computer Science – Second Class Upper (2023)
Professional Certifications
- Microsoft Certified: Identity and Access Administrator Associate (SC-300) – 2026
- Microsoft Certified: Security, Compliance, and Identity Fundamentals (SC-900) – 2026
- Certified in Cybersecurity (CC) – (ISC)² – 2024
- ITIL® 4 Foundation – 2026
Professional Memberships
- International Information System Security Certification Consortium ((ISC)²)
- Women in Cybersecurity (WiCyS)
- ITIL®
Professional Experience
- Cybersecurity Helpdesk Analyst – NHS England (current role), Compliance and Risk Analyst, Security Administrator – Financial Services Sector
Mentorship, Leadership, and Community Impact
- Currently mentoring aspiring cybersecurity professionals through Women in Cybersecurity.
- Mentored over 20 women in cybersecurity and received Top 1 recognition badge from ABC for impact and contribution.
- Collaborated in the co-development of a cybersecurity assessment template tailored for micro and small businesses in Nigeria, supporting improved security posture and awareness.
Research and Advanced Training
- Recently admitted to a PhD programme, with research focused on Identity and Access Management in Cybersecurity.
- Selected as one of 250 candidates out of over 5,000 applicants for an API Security Training Programme organised by the Cybersafe Foundation.
I would be grateful for guidance on:
- How best to map this evidence to the Exceptional Promise criteria, and
- Whether the combination of academic excellence, early-career impact, mentorship, and industry engagement is sufficient for endorsement.
Thank you for your time and support