I am a cloud Infrastructure and Security Specialist with over 10 years of experience in IT and security. My expertise includes Cloud Technologies like Google Cloud Platform, AWS, and Microsoft Azure, as well as tools such as Terraform, Microsoft 365 Defender, and endpoint security measures. I am well-versed in Privileged Access Management and Governance for compliance and control.
I excel in Incident Management and Root Cause Analysis, ensuring efficient resolutions and preventing future issues. I have led a team of six, emphasizing effective communication and reporting. My commitment to best practices has enhanced incident investigations and security across organizations I've served.
Cloud Security Posture & Compliance: Identity & Access Management (IAM): Security Incident Response & Automation: Service Catalog & Roadmap Leadership: Security Policy & Governance:
Key Skill Areas:
Cloud Security Architecture and Design:
Design secure architectures in Azure, ensuring compliance with standards (ISO, PCI-DSS, HIPAA).
Implement IAM policies like Azure AD, RBAC, and MFA.
Integrate tools such as Azure Security Center and Azure Sentinel for threat detection.
Security Posture Management:
Monitor Azure security posture using Azure Secure Score and other tools.
Conduct audits and vulnerability scans to identify gaps.
Develop security baselines for Azure resources.
Threat Detection and Response:
Use Microsoft Sentinel for SIEM to monitor security events and respond to incidents.
Automate responses with SOAR capabilities to improve threat mitigation.
Investigate incidents for quick remediation.
Compliance and Risk Management:
Ensure compliance with standards and policies through monitoring.
Collaborate with teams to assess risks and manage incidents.
Security Automation and Policy Enforcement:
Automate policy enforcement with Azure Policy and Blueprints for consistent compliance.
Manage security controls like encryption and access management.
Site Reliability Engineer (SRE) Responsibilities:
Ensure Azure applications' high availability through performance monitoring and fault tolerance.
Develop automation tools and implement Chaos Engineering for resilience.
Incident Response and Monitoring:
Maintain monitoring tools like Azure Monitor to track system health.
Lead incident responses and conduct reviews to enhance resilience.
Automation and Optimization:
Automate tasks and CI/CD pipelines to enhance deployment speed.
Optimize performance and costs using Azure Autoscaling and Cost Management.
Collaborate with teams for continuous improvement.
Capacity Planning and Scalability:
Implement capacity planning and auto-scaling strategies for resource availability.
Design disaster recovery strategies with Azure Site Recovery and Backup.
Collaboration and Communication:
Work with development and security teams to meet reliability and security requirements.
Cloud Security Architecture & Design:
Design secure cloud architectures for public and hybrid environments (AWS, Azure, Google Cloud). Ensure secure access using IAM tools (e.g., Azure AD, AWS IAM) with least privilege and MFA. Develop security frameworks and compliance controls aligned with standards (e.g., ISO 27001, PCI-DSS, HIPAA).
Cloud Threat Protection & Incident Response:
Implement threat detection strategies with tools like Cloudflare and AWS GuardDuty for monitoring and alerts. Collaborate with Incident Response teams to address security incidents, including breaches and DDoS attacks.
Data Protection & Encryption:
Implement encryption for data at rest and in transit using AWS KMS, Azure Key Vault, or Google Cloud KMS. Enforce Data Loss Prevention (DLP) measures to safeguard sensitive information.
Cloud Security Automation & Policy Enforcement:
Automate security controls with CloudFormation or Terraform to enforce policies consistently. Manage cloud security baselines and compliance monitoring with tools like AWS Config or Azure Policy.
Security Monitoring & Logging:
Utilize SIEM tools (e.g., Splunk, Azure Sentinel) to analyze security logs. Monitor applications for anomalies and set up alerts for potential threats.
Endpoint Protection Strategy & Implementation:
Develop strategies to secure devices connecting to cloud infrastructure, including laptops and IoT. Deploy EDR solutions like CrowdStrike or Microsoft Defender for monitoring and response.
Endpoint Security Tools Management:
Manage antivirus and firewalls on endpoints. Regularly update devices to mitigate vulnerabilities.
Device Access & Control Management:
Implement policies to restrict unauthorized access and enforce strong encryption using BitLocker or FileVault.
Security Awareness & Training:
Conduct user training on endpoint risks and best practices. Raise awareness about threats like phishing and ransomware.
Endpoint Risk Assessment & Vulnerability Management:
Perform risk assessments to identify vulnerabilities and ensure endpoint security. Manage patches for operating systems and software.
Endpoint Incident Response:
Address endpoint security incidents, including malware and unauthorized access. Use EDR tools to investigate and remediate threats.
· Handling security incidents as reported by individuals and automated systems on laptops and mobile devices.
· Handling support of PC and Mac based users with security related problems.
· Monitoring compliance with IT Security policy and applicable law
· Coordinate and execute IT security projects at multiple locations.
· Engage in security research in keeping abreast of the latest security issues for Cloud enabled enterprises (including SAAS and IAAS)
· Monitoring system compliance with the IT framework for controls and levels of access; recommending improvements.
· Maintains access for business by providing information, resources, and technical support.
· manage security vulnerabilities and help manage risks on laptop and server forensics as well as Cloud / Service Provider forensics.