
Tom Welsh
AI, Cybersecurity & Technology Operations Specialist
I design and implement AI-driven, secure infrastructure and risk systems for regulated, global organisations.
30+
Years Experience
Global
Reach
Published
Author (Online & Print)
MSc
Cybersecurity (Distinction)
Career Highlights
Risk Automation
Leveraged Python and Jupyter notebooks to automate reporting and data analysis, reducing RCSA timelines from 6-9 months to 3 months
Global Security Tooling Deployment
Implemented enterprise security across global network infrastructure
CyberSecurity, AI and Risk Consulting
Providing expert consulting services through The AIAA Consultants Ltd
Published Author
Author of the Incident Management chapter in the Cyber Security Practitioner's Guide, exploring the process of managing a security breach
Technical Expertise
Deep technical knowledge across the full technology stack — from hardware and networking through to modern AI development and deployment.
AI & Automation
- AI-Driven Development
- Prompt Engineering
- LLM Training & Fine-tuning
- n8n Automation
- Fabric Framework
- Ollama
Cybersecurity
- Darktrace Implementation
- Security Tool Deployment
- Vendor Risk Management
- Data Classification
- Security Policy Development
- Incident Management
Infrastructure
- Linux/UNIX Administration
- VMware Virtualisation
- Datacenter Operations
- HP/Dell/IBM Hardware
- Nagios Monitoring
- Configuration Management
Programming
- Python
- Bash Scripting
- PowerShell
- Data Visualisation
- API Integration
- Automation Scripts
Networking
- TCP/IP
- DNS/SNMP/SMTP
- Cisco Infrastructure
- NFS/SAMBA
- SSH/SCP/FTP
- Network Security
Risk & Compliance
- Operational Risk Management
- Risk Appetite Statements
- MaRisk Compliance
- RCSA Facilitation
- KRI Development
- Board Reporting
Project Support
- Mobile Phone Rollouts
- Desktop Rollouts
- Laptop Rollouts
- Enterprise Rationalisation
- Custom Software Services
- Onsite Support Services
Data & Analytics
- Data Analysis
- Reporting & Dashboards
- Jupyter Notebooks
- Data Visualisation
- SQL Queries
- Power BI / Excel
What People Say
Feedback from colleagues, clients, and stakeholders I've worked with over the years.
“Tom is an incredibly hard and effective worker. He has a deep knowledge of servers and server monitoring, with a knack of solving knotty problems quickly.”
Senior Technical Business Analyst
Financial Services
“Tom was an extremely hard worker and took difficult situations and made them easier. He was able to pick up new technologies and manage his group to a high level. I would be very happy to work with him again.”
Cloud Engineering & Operations Executive
Global Corporation
“Tom brings genuine passion to everything he does. He may not claim to be an expert in every field, but his curiosity drives him to explore even the smallest details—those insights often lead to smart, effective solutions. If Tom were available, I wouldn’t hesitate to hire him again.”
IT Director
Australian Financial Services Company
Education & Publications
Continuous learning combined with sharing knowledge through published works.
Education
MSc Cybersecurity
Northumbria University
DistinctionProfessional Development
- CS50x - Introduction to Computer ScienceHarvard University
- CS50P - Programming with PythonHarvard University
- Code in Place - PythonStanford University
- + 3 more certifications
Published Works
Incident Management
Comprehensive chapter on cyber incident management—preparing for, dealing with, and recovering from attacks. Covers security policies, incident response plans, organizational risk and cyber insurance.
Read articleMulti-part SeriesCreating Stunning Visualisations with Plotly
A beginner's guide to creating beautiful data visualisations using Plotly's basic chart types.
Read articleTechnical ArticlePython Data Masking & Preparation
Best practices for data masking and preparation before creating visualisations.
Read articleTechnical Articlen8n Docker Image and Apache Reverse Proxy
A guide to deploying n8n with Docker and configuring Apache as a reverse proxy for multi-site servers.
Read articleTechnical ArticleFabric - An Open-Source Framework
Introduction to the Fabric framework for AI-augmented workflows.
Read articleView all publications →“Thrives in operational environments requiring hands-on technical expertise, troubleshooting skills, and decades of accumulated knowledge to implement robust solutions.”
— Core Philosophy
Ready to Transform Your Technology Operations?
Whether you need AI automation, cybersecurity implementation, or infrastructure modernisation, let's discuss how I can help your organisation succeed.