• Led IT-OT Security Maturity and Risk Assessments to improve security postures.
• Ensured compliance with industry standards like NIST CSF, IEC 62443, and ISO 27001.
• Performed risk assessments for OT/ICS networks, including SCADA, DCS, and PLC systems.
• Developed secure OT and IT system architectures to guard against evolving threats.
• Collaborated with teams to integrate security controls, boosting cyber resilience.
• Spearheaded incident response strategies, reducing response times and breach impacts.
• Managed security audits and penetration tests to identify and rectify vulnerabilities.
• Directed company-wide cybersecurity training to enhance security protocols.
• Developed security architecture frameworks for FOSS integration across platforms.
• Coordinated with teams to enforce secure software lifecycle and coding standards.
• Oversaw incident response and investigations for security breaches in open source components.
• Free Open Source Software (FOSS) Governance – Point of Contact, Manage and lead FOSS BAU team
• FOSS License assessment for policy violation, Security Vulnerabilities and Risk assessment,
• Automation of various tools - Black Duck, Aqua, FOSSology
Technical Solution Architect (Apr 2020 - Nov 2021)
• Vulnerability assessment, Remediation Planning and Execution
• Running Risk assessment & security tests and designing countermeasures to eliminate potential risks
• Steerco Governance and client review meetings and presentation
• Operational security dashboard automation (vulnerability management, assets)
Information Security Expert (Jun 2018 – Apr 2020)
• Develop DLP strategies and policies to protect sensitive information across multiple platforms
• Continuously monitor data transactions to quickly detect and address breaches or violations
• Implement and manage DLP policies using advanced tools to control data access and transfer
• Integrate DLP systems with IT infrastructure for seamless protection and efficient data management
• Generate reports on data security for audits and compliance, assessing system effectiveness
• Integration of McAfee DLP with various MTAs (Mail Transfer Agent) and Web Proxies
Technical Service Lead (Apr 2013 - Jun 2018)
• Manage and lead SOC team under shared resource model
• Building the security architecture and system
• Contribution to security governance framework (primarily ISO:27001)
• Compliance management (including PCIDSS)
• Security incident management
• BAU support functions across a number of systems and clients
Symantec Technical Specialist of various products.
Symantec Endpoint Protection.
Symantec Endpoint Encryption.
• Technical Support for Symantec Products, e.g. Endpoint Security, DLP, Encryption, PGP.
• Analysis and improvements to existing security systems
• Compiling and presenting reports on penetration tests
• Technical support to Ophthalmologists based in United States.
• Coordinating with technical teams to deploy, support and troubleshoot First Insight software.
• HIPPA regulations and compliance, Audit.
• Provided technical support to Linksys SOHO networking Products.
• Supporting various products like Routers, Switches, VOIP devices.
• Computer Sales and after sales services.
• Annual Maintenance contract of small scale companies.
Vidya-Pratisthan Institute of Information technology was a branch of C-DAC training Institute.
• Office System Administration and Maintenance.
• Setting up labs for students undergoing various trainings.
Tata Motors is the Pioneer in the Automobile industry.
Tata Motors Limited; formerly Tata Engineering and Locomotive Company (TELCO) is India's largest and the only original equipment manufacturer (OEM) offering extensive range of cars, sports utility vehicles, trucks, buses and defense vehicles.
Network Security
Endpoint Protection
Security Auditing
Operating System Security
Identity Management
Compliance Management
Patch management
Vulnerability Assessment
Security Architecture
Secure Network Design
Security policy development
Data Loss Prevention
Incident Response
IoT Security
Application security
Security Awareness Training
Security Information and Event Management
Encryption Technologies
Threat analysis
Firewall Installation
Critical Thinking
Security Needs Assessment
Time Management
Security Protocols
Analytical Thinking
Recently I published my own book called Introduction to Cyber Security. This book is a handy guide to the world of Cyber Security.
https://www.amazon.com/Introduction-Cyber-Security-Guide-World-ebook/dp/B08XPRF87B/
I have published three books till now.
https://www.amazon.co.uk/stores/author/B0CJPCX8YQ
Accomplished Cyber Security author, Certified Information Security Manager (CISM), ISO27001-Lead Auditor, PMP, ITIL, PRINCE2, With a wealth of experience in Cyber security functions across multiple large-scale organisations, I have honed my skills and knowledge in products like Symantec, Sophos, McAfee, Nessus, and more. My areas of specialisation encompass OT Security, Cyber Security, Infrastructure Security, Vulnerability and Risk Management, and Security Investigation & Incident Management.
Thriving in complex and multi-faceted organisational settings, I excel in environments with high time pressure and intricate logistical challenges. Recognised for my expertise in Endpoint Security, Vulnerability and Risk Management, Free and Open Source Software Governance, Operational Technology Security, and Data Loss Prevention.
I take great pride in leveraging my diverse skill set and experience to contribute to organizations navigating the ever-evolving security landscape. With unwavering dedication to confidentiality, integrity, and availability, I ensure the protection of critical assets. Committed to continuous learning and staying ahead of emerging trends, I strive to enhance security measures and mitigate risks for organizations.
Skills and attributes I am known for:
• OT Security
• Endpoint Security
• Vulnerability and Risk Management
• Free and Open Source Software Governance
• Operational Technology Security
• Data Loss Prevention
• Project Management
Technical Writing
Cybersecurity awareness
Nessus
Endpoint Security
Vulnerability Management
Data Loss Prevention
As a cybersecurity author, I've successfully published three insightful books, with a fourth in progress, contributing valuable knowledge to enhance cybersecurity awareness and practices.