- Working on SIEM incidents and take appropriate action as per SLA matrix
- Configuring, commissioning and Monitoring Firewalls (Checkpoint, Fortinet, and Cisco ASA), VPNs, Proxy-Zscaler, Cisco ISE, Skybox-Firewall Assurance, and intrusion detection & prevention systems to detect and prevent cyber-attacks
- Upgraded Checkpoint Gateways from R77 to R81.10 and Manager from R80.20 to R81.10
- Orchestrated a multinational cybersecurity risk assessment program, identifying and mitigating potential threats, which led to a 30% reduction in vulnerability exposures across critical business units.
- Developed a comprehensive risk management framework utilizing NIST standards, which was adopted company-wide, enhancing the security posture and reducing incident response time by 25%.
- Managed a team of 12 security analysts in the deployment of a real-time risk monitoring system, resulting in a 40% improvement in threat detection accuracy.
Penetration Testing Coordination & Management:-
Initiated and Scoped Penetration Tests:
- Defined the objectives, scope, and target systems for penetration tests in alignment with cybersecurity goals and project requirements.
- Collaborated with stakeholders to ensure that critical areas and potential vulnerabilities were adequately covered during the testing phase.
- Vendor and Third-Party Collaboration:Acted as the primary point of contact between the internal team and third-party penetration testers, ensuring smooth communication and clarifying testing goals and expectations.
Reviewed vendor proposals and selected appropriate third-party penetration testers based on expertise, project needs, and timelines.
- Report Analysis and Risk Assessment: Conducted in-depth analysis of penetration testing reports, identifying critical security vulnerabilities, misconfigurations, and potential threats.
Mapped vulnerabilities to potential risk impacts on system integrity, confidentiality, and availability, aligning findings with the overall cybersecurity threat landscape.
- Remediation Planning & Implementation: Collaborated with development and security teams to prioritize vulnerabilities, ensuring high-risk issues were addressed promptly.
Developed and tracked remediation plans to ensure that vulnerabilities identified during penetration tests were fixed in a timely manner.
Monitored the implementation of security fixes and validated their effectiveness in mitigating the identified risks.
- Post-Test Validation: Requested follow-up testing to confirm that remediation steps effectively closed the identified security gaps.
Provided post-remediation reports to stakeholders, summarizing the outcome of pen tests and the implemented security improvements.
- Continuous Improvement: Leveraged insights from pen tests to refine security controls, enhance cybersecurity policies, and improve the overall security posture of the system.
Updated cybersecurity documentation and guidelines to incorporate lessons learned from penetration test findings and remediation efforts.