Summary
Overview
Work History
Education
Skills
Accomplishments
Certification
Timeline
Generic
Abhi  Victor

Abhi Victor

New Delhi

Summary

Accomplished Cybersecurity Strategist and Architect with over 10 years of leadership experience across aviation, critical infrastructure, and smart organizations. Former BISO at Delhi International Airport, where I led national-scale SOC operations, cyber crisis response, and regulatory compliance aligned with ISO 27001:2022, GDPR, and CERT-In.

Specialized in architecting cloud security controls (AWS, Azure), deploying deception technology, and implementing OT/ICS security frameworks in aviation and critical infrastructure environments. Adept in insider threat management, third-party risk governance, and securing IT-OT converged networks.

Extensive hands-on experience with SIEMs (Splunk, QRadar,Sentinel,Seceon,etc.), EDRs (SentinelOne, CrowdStrike), SOAR, and endpoint hardening.

Recognized for translating strategy into secure execution, building cross-functional cyber teams, and driving scalable security transformation. Pursuing CISSP and PMP with a long-term vision to lead global cybersecurity innovation and resilience.

Overview

11
11
years of professional experience
1
1
Certification

Work History

Lead - IT security & Processes

Altius Telecom
Gurgaon
06.2025 - Current
  • Provide enterprise-wide cybersecurity leadership across SOC, GRC, VAPT, ISMS, cloud security, endpoint security, and identity access management, ensuring alignment with organizational strategy and regulatory expectations.
  • Own the organizational cyber risk posture, translating technical threats into business risk impact, and enabling informed decision-making at the executive and board level.
  • Define, execute, and continuously evolve the enterprise information security strategy and roadmap, aligned with business growth, digital transformation, cloud adoption, and regulatory compliance.
  • Lead and govern 24/7 SOC operations and MSSP partnerships, ensuring measurable improvements in detection, response time, threat intelligence maturity, and cost optimization.
  • Establish and mature Vulnerability and Threat Management programs, including application, infrastructure, cloud, and third-party security assessments; ensure risk-based remediation prioritization.
  • Drive Governance, Risk, and Compliance (GRC) frameworks, including enterprise risk assessments, control effectiveness reviews, risk acceptance governance, and executive risk reporting.
  • Serve as the ISMS owner aligned with ISO 27001, ensuring policy governance, audit readiness, continuous control improvement, and successful internal and external audits.
  • Lead security audits and regulatory assessments, ensuring zero or low critical observations, effective remediation, and sustainable compliance maturity.
  • Design and enforce enterprise security policies and standards, including data protection, privacy, cloud security, access control, incident response, third-party risk, and secure software development.
  • Act as the Data Protection & Privacy security lead, ensuring organizational alignment with DPDP Act through data classification, privacy risk assessments, consent governance, and third-party data protection controls.
  • Oversee cloud security strategy and governance across hybrid and public cloud environments, ensuring secure architecture, identity controls, posture management, and regulatory alignment.
  • Lead adoption and governance of Zero Trust and modern security architectures, including Palo Alto Prisma Access, EDR/XDR platforms, and secure access technologies.
  • Ensure effective endpoint security and advanced threat protection, balancing user experience, risk reduction, and operational efficiency.
  • Develop and present CISO dashboards and board-level cyber risk reports, covering: Risk exposure and threat landscape, incident trends and response maturity, compliance and audit status, and strategic security initiatives and investment outcomes.
  • Act as a trusted advisor to the CEO, CIO, Risk Committee, and Board, providing clear, outcome-focused cyber security insights and recommendations.
  • Drive security culture and awareness programs, promoting shared accountability for cyber risk across business and technology teams.
  • Lead continuous security maturity improvement, leveraging metrics, automation, process optimization, and industry best practices.

Business Information Security Officer & SOC manager

GMR Group
Delhi
07.2021 - Current
  • Defined security practices and standards to safeguard company assets and data.
  • Participated in business continuity and disaster recovery preparedness activities.
  • Reviewed and recommended updates to information security policies, standards and guidelines.
  • Reported regularly on status of information security activities to executive leadership teams.
  • Implemented cybersecurity awareness training programs for staff members at all levels.
  • Owned security awareness program, preparing general and team-specific trainings, quizzes and workshops.
  • Liaised with external vendors to assess third-party risks and develop mitigation strategies.
  • Collaborated with IT teams to integrate security measures into new software development projects.
  • Assessed overall performance of information security program through audits and evaluations.
  • Provided guidance on best practices for data protection and privacy management.
  • Guided leadership in decision-making related to security and risk assessment operations.
  • Led third-party risk-assessment program, assessing compliance and vulnerabilities.
  • Maintained up-to-date knowledge of emerging technologies, threats, and industry best practices.
  • Reviewed security incidents and took corrective actions to prevent future occurrences.
  • Oversaw vulnerability scanning and penetration testing initiatives to assess system security.
  • Supported development, documentation and presentation of IT security awareness, education and training for management, IT personnel and users.
  • Coordinated incident response efforts during cybersecurity breaches or attacks.
  • Evaluated existing infrastructure for potential weaknesses and recommended improvements.
  • Conducted risk assessments to identify vulnerabilities and recommend appropriate controls.
  • Managed team of information security professionals in day-to-day operations.
  • Oversaw company governance, regulations and compliance efforts.
  • Monitored ongoing threats and trends in cybersecurity landscape to proactively address potential issues.
  • Developed and implemented information security policies, procedures, and standards.
  • Established key performance indicators KPIs to measure effectiveness of information security initiatives.
  • Presented security recommendations and implemented security improvements in new or existing applications, services and infrastructure.
  • Supported threat modeling workshops across applications and company infrastructure.
  • Worked closely with legal counsel to manage any regulatory inquiries or investigations related to data privacy issues.
  • Created disaster recovery plans to ensure business continuity in event of major incident.
  • Managed, trained and mentored direct reports within security architecture team.
  • Assessed information security performance, identifying problems, evaluating trends and anticipating requirements.
  • Ensured compliance with industry regulations, such as HIPAA, GDPR, and PCI-DSS.
  • Assisted with evaluation, selection and implementation of security products and technologies.
  • Improved server options, network security and other metrics with proactive user training.
  • Minimized risk of recurring violations by educating employees on correct procedures.
  • Protected information during transmission to keep it confidential and prevent system incursions.
  • Safeguarded digital data from destruction, disclosure and unauthorized modifications.
  • Kept data processing activities functional and secure with regular risk assessments and tests.
  • Updated security files to align with new software, correct errors, or incorporate new users.
  • Helped standardize operations by preparing documentation of policies and procedures.
  • Supported user needs, helping with access problems and security issues.
  • Maintained current virus protection systems with updated protections against new threats.
  • Managed implementation of new systems, coordinating closely with internal personnel and outside vendors.

Associate Lead - Information security

Sunera Technologies, Inc.
07.2020 - 07.2021
  • Leading the Endpoint security and SOC operations for the client.
  • Managed implementation of new systems, coordinating closely with internal personnel and outside vendors.
  • 1st point of escalation for customer.
  • Align Weekly/ Fortnightly reviews with Client and Sr Security Delivery Manager.
  • Co-ordinating with the Client and stakeholder fulfilling their requirement on time, providing off-hour coverage.
  • Created the Scope document, RACI document, SOP for the client, conducting bi-Weekly Security review meeting with the customer to have better understanding of the security controls.
  • Handling and managing Security operation Centre (SOC), IRT & EDR for the Client.
  • Looking after health of all the Log sources and integration of devices with SIEM& Endpoint security tools.
  • Using InsightIDR as SIEM.
  • Working as L3 for Incident response for SOC, Endpoint services & Vulnerability Management.
  • Providing and managing End to end SOC process, Endpoint services & Vulnerability Management.
  • Conducting Malware analysis, providing remediation and mitigation plan for All the Security incidents.
  • Working on and having good experience in endpoint security tools (Trend Micro & Checkpoint).
  • Using Rapid7 InsightVM as Vulnerability Management tool.
  • Remediating and mitigating the Endpoint security alert by performing thorough Analysis and investigation using endpoint security tools and blades.
  • Perform initial analysis, identification, remediation, and documentation of Cyber Attacks and computer system compromises.
  • Handle incident escalations as necessary from other analysts.
  • Projecting & managing incident responses and coordinating remediation with customers.
  • Helping/ Training L1, L2 to do advance level threat analysis, as well analysing APT using various tools.
  • Provide leadership and mentoring to other analysts.
  • Perform basic malware analysis and forensic analysis of network activity, disks, and memory.
  • Threat hunting using SIEM and MITRE Attack Framework using TTP.
  • Fine tuning SIEM and writing correlation for the use cases.
  • Defining Endpoint policy as per the Client environment.
  • Proactively research and monitor security-related information sources to aid in the identification of threats to L3's networks, systems, and intellectual property.
  • Assist in the development of effective Enterprise Security Policies and Procedures.
  • Innovate and automate all the things.
  • Troubleshoot systems, network and applications.
  • Coordinate and lead the response to technology problems.
  • Risk and Vulnerability assessment using InsightVM.
  • Generating audit report for Risk and vulnerability management.

Senior Security Manager

KRATIKAL TECHNOLOGIES PVT LTD.
05.2019 - 07.2020
  • End-to-End Project/ Program management.
  • Managed team of security professionals responsible for protecting data, systems, and infrastructure from cyber threats.
  • 1st point of escalation for customer (operating from Customer location).
  • Align Weekly/ Fortnightly reviews with Client and Sr Security Delivery Manager.
  • Co-ordinating with the Client and stakeholder fulfilling their requirement on time, providing off-hour coverage.
  • Creating incident and Risk management metrics every week to give an insight to the customer on their security environment and Risk assessment.
  • Conducting Weekly Security review meeting with the customer to have better understanding of the security controls.
  • Single handedly managing Security operation Centre (SOC) & IRT for the Client.
  • Creating Industry standard security reports specific to the client environment for Risk assessment.
  • Creating SOP for L1 & L2 for Incident Response and SOC Team.
  • Looking after health of all the Log sources and integration of devices with SIEM.
  • Perform initial analysis, identification, remediation, and documentation of Cyber Attacks and computer system compromises.
  • Handle incident escalations as necessary from other analysts.
  • Projecting & managing incident responses and coordinating remediation with customers.
  • Helping/ Training L1, L2 to do advance level threat analysis, as well analysing APT using various tools.
  • Provide leadership and mentoring to other analysts.
  • Perform basic malware analysis and forensic analysis of network activity, disks, and memory.
  • Analyze threat and vulnerability alerts, determine current impacts, and coordinate remediation actions as necessary.
  • Fine tuning SIEM and writing correlation for the use cases.
  • Proactively research and monitor security-related information sources to aid in the identification of threats to L3's networks, systems, and intellectual property.
  • Assist in the development of effective Enterprise Security Policies and Procedures.
  • Innovate and automate all the things.
  • Looking after Vulnerability assessment, penetration testing, Configuration Assessment and Patch management.
  • DLP using Symantec, Force point.
  • Provide Level 3 operational support for Network Security Products & Services (Firewalls, Anti-Spam technologies, Intrusion Detection Systems, E-mail, DNS, Web Application Security and Data Leakage Prevention, Network Access Control, etc.).
  • Administrate Network security systems (Juniper Firewalls, Cisco ISE, Websense Proxy, Forti gate & Checkpoint firewall etc.).
  • Troubleshoot systems, network and applications.
  • Coordinate and lead the response to technology problems.
  • Align global strategies with regional needs and demands.
  • Risk and Vulnerability assessment.
  • Generating audit report for Risk and vulnerability management.
  • Trained employees on proper security protocols and awareness of potential threats.
  • Collaborated with senior management to establish risk tolerance levels and align security initiatives with business objectives.
  • Evaluated new technologies and tools to improve overall organizational security posture.
  • Oversaw incident response efforts in order to minimize impact and prevent future occurrences.
  • Identified, investigated and resolved security breaches to return order.
  • Devised and practiced contingency plans for diverse emergencies and disturbances.
  • Monitoring of events & alerts from a multitude of technologies (SIEM) to detect malicious activity and security threats.
  • Minimized risk of recurring violations by educating employees on correct procedures.
  • Collection of necessary event logs that could help in the incident containment and security investigation.
  • Used Splunk and Qradar as SIEM tool.
  • Lead team to conduct Threat, Malware, APT analysis using various tools.
  • Triage security alerts following a SOP and also following the incident management process (PICERL).
  • Detailed analysis using a variety of tools and techniques to investigate, navigate, correlate and understand security incidents.
  • Threat Hunting using ELK & Splunk.
  • Conducted VAPT using various tool such as Metasploit, Nessus, Burp suite etc.
  • Recognize attacks based on their signatures, alerting and reporting latest security threats & vulnerabilities.
  • Monitors health of data sources, check for all the tools and report any shortcomings immediately to the concerned team.
  • Analysis and monitoring of Phishing mails using different threat intelligence tools.

Cyber Security Consultant

Freelance
Bangalore
12.2014 - 11.2018
  • Conducted corporate security awareness programmes to enhance employee security posture.
  • Built and established SOC and incident response operational processes tailored to organisational needs. Reviewed endpoint security configurations and provided actionable recommendations. Developed security metrics and dashboards for continuous risk monitoring.
  • Performed network and infrastructure security risk assessments, with mitigation strategies. Monitored network traffic for suspicious activity to prevent cyberattacks and data breaches.
  • Prepared and presented reports on security incidents and trends to senior management.
  • Audited networks and security systems to identify vulnerabilities.
  • Optimised security monitoring tools to reduce false positives, ensuring timely response to genuine threats.
  • Supported anti-virus compliance to reduce vulnerabilities and safeguard company data.
  • Worked with the IT Projects team to verify IT security requirements for incoming systems or IT services.

Education

B.TECH - computer science and engineering

CAMBRIDGE INSTITUTE OF TECHNOLOGY

Skills

Secure System Architecture & OT Security: Fortinet FortiGate, Cisco ASA, Cisco ISE, VMware for network security and secure OT architecture SOC Management & Incident Response: InsightIDR, QRadar, Splunk, CrowdStrike EDR, SentinelOne, SECEON XDR, Zscaler DLP for SOC operations, incident response, and endpoint protection Security Compliance & Risk Management: Nessus, Qualys Guard, InsightVM for vulnerability assessments ISO 27001, GDPR, PCI DSS, CIS, OWASP, HIPAA for compliance and risk management Vulnerability Management & Threat Assessment: Nessus, Qualys Guard, Metasploit, InsightVM for vulnerability scanning and risk assessment Threat intelligence via Cisco Talos, Trend Micro, MXToolbox, VirusTotal, Cuckoo Sandbox Endpoint Security & Network Defense: CrowdStrike EDR, SentinelOne for endpoint protection FortiGate, Palo Alto, Checkpoint Firewalls, Zscaler DLP, WAF, Anti-DDOS Protection for network defense Malware Analysis & Threat Intelligence: OSINT Tools: Shodan, Maltego, Censys, Passive DNS for open-source intelligence gathering MITRE ATT&CK Framework for comprehensive threat analysis and mapping of attack techniques Cuckoo Sandbox, VirusTotal, Encase, FTK, ProcMon, Wireshark, Metasploit, Burp Suite for malware analysis and threat identification Security Policy & Governance Development: Zscaler DLP, Indefend DLP for data loss prevention ISO 27001 tools for policy development and compliance Authentication, Access Control & Identity Management: Arcon PAM, Kerberos Authentication, Active Directory (AD), Cisco ISE, IAM Solutions, PIM for identity and access management Multi-factor authentication (MFA) for enhanced security Incident Forensics & Forensic Analysis: Encase, FTK, Splunk, QRadar, LogRhythm for forensic investigations, log analysis, and threat mitigation Cyber Crisis Management & Response Planning: Zscaler DLP, CrowdStrike EDR, Palo Alto Firewalls, WAF for crisis response management Cloud Security & Data Protection: AWS, Azure, Google Cloud Security for securing cloud environments AWZ guard duty, Cloudwatch, Azure sentinel, Azure WAF etc Zscaler DLP, Indefend DLP for cloud data protection Technical Skills & Network Security: Wireshark, Metasploit, Burp Suite, Nessus, Qualys Guard, Cisco Routers (881, 1760, 1841) for network analysis, testing, and configuration Linux, Windows environments, VLAN, RIP, EIGRP, OSPF, BGP for network and system administration Email security and awareness training: Email security tools: Mimecast, Proofpoint, Barracuda Email Security, Zix Email Security for protecting against phishing and malware in emails Awareness Training Platforms: KnowBe4, Cofense, Proofpoint Security Awareness Training for phishing simulations and employee security training

Accomplishments

  • Recommended for Indian Army TGC entry.
  • District player of Cricket.
  • MECON club Cricket player.
  • District Badminton player.
  • Won several awards in cricket and Badminton in various levels.
  • Represented my University, College and School in Cricket and Badminton.

Certification

CCNA (Cisco Certified Network Associate) – Cisco (CSCO12994492);
CHFI (Computer Hacking Forensic Investigator) – EC-Council (ECC6380792154);
CISSP (ISC²) – Trained; examination aligned for Feb 2026;
ISO/IEC 27001 & ISO/IEC 42001 (AIMS) – Trained (ISMS & AI Management Systems);
AAISM (Advanced AI Information Security Management) – Ongoing;
CIPM (Certified Information Privacy Manager – IAPP) – Ongoing.

Timeline

Lead - IT security & Processes

Altius Telecom
06.2025 - Current

Business Information Security Officer & SOC manager

GMR Group
07.2021 - Current

Associate Lead - Information security

Sunera Technologies, Inc.
07.2020 - 07.2021

Senior Security Manager

KRATIKAL TECHNOLOGIES PVT LTD.
05.2019 - 07.2020

Cyber Security Consultant

Freelance
12.2014 - 11.2018

B.TECH - computer science and engineering

CAMBRIDGE INSTITUTE OF TECHNOLOGY
Abhi Victor