Senior INFORMATION SECURITY MANAGER
PROFILE SYNOPSIS
Competent, innovative and self-motivated professional with 13+ years of experience in the field of Information Security with notable success directing a broad range of corporate IT security initiatives while participating in planning, analysis and implementation of solutions.
Hands-on experience in evaluating, implementing and managing cutting edge technologies to ensure reasonable level of security within the enterprise while ensuring balanced alignment with business requirements, security policies and industry best practices.
Throughout my career I have developed solutions to the Information Security challenges that businesses in different industry verticals face, implementing strategies that effectively mitigate risk while enabling the business.
As an Information Security thought leader provide the vision and leadership necessary to manage the risk to the platform assigned and will ensure business alignment, effective governance, system and infrastructure availability, integrity and confidentiality.
Known for logical and analytical skills, with superior performance and creative problem-solving abilities and able to coordinate and direct all project-based efforts while managing, motivating and guiding teams.
Seeking a position as an Information Security Manager to be abreast of the latest developments in the ever-emerging field of Information Security and implement the knowledge, experience and skills to promote a reasonably secure environment in the organization.
Overview
14
14
years of professional experience
2
2
Languages
Work History
Sr. Manager Information security
Conduent Business services india LLP
12.2018 - Current
Act as a liaison to the BU managers and their delegates to ensure compliance of this procedure.
Manages the daily operations of the CSIRT, including staffing, budgeting and other relevant management functions, and provides specific technical expertise for functions supervised.
Manages and leads a team of professionals in Incident Response and management and ensures the discharging of respective functions in accordance with established policies and procedures.
Maintain and activate the Incident Response Plan.
Focal point for all business decisions which must be made during an incident.
Decision maker for the Response Team and Recovery Team for all incidents.
Provides technical support for forensics services to include evidence seizure, computer forensic analysis and data recovery, in support of computer crime investigation.
Researches and maintains proficiency in open and closed source computer exploitation tools, attack techniques, procedures and trends.
Demonstrates strong evidence of analytical ability and attention to detail.
Has a broad understanding of all stages of incident response.
Establish and drive business unit-wide training and specialized security training/awareness programs for executives and privileged users.
Manages execution of security breach test plans and remediation plans with team and business.
Engage with auditors to acquire and retain certifications/ attestations.
Define and report on information security KPIs.
Provides Security Project Management and leadership to staff and external resources in support of established goals and objectives, improved efficiencies, and problem resolution.
Organize the preparation of the security status dashboards including presentation to executive management.
Responsible for the security schedules of major global contracts and the supplier integration and delivery of secure services as contracted.
This includes managing all service delivery components and coordination of supplier teams delivering services.
Managing MSSP and vendor relationships and Driving process improvement across procedural and technical controls.
Manager Information security operation.
Vmware Software India Pvt Ltd
02.2016 - 12.2018
Direct a global cyber security operation team of information security engineers and analysts responsible for cyber Security Incident Response.
Leadership responsibilities include strategic planning, execution and delivery, executive collaboration, budget, performance management, staffing and program oversight.
Lead strategy, program development, for implementation of threat analytics platforms in infrastructure, including data collection, behavioral profiling, anomaly detection, predictive analytics, threat intelligence and use case development.
Leads the Direct 24x7 operational support for data collection, threat analytics, malware detection and analysis, behavioral monitoring, cloud security monitoring, data loss prevention (DLP), AD monitoring, and risk reporting.
Regularly develops and enhances standard operating procedures (SOPs).
I have built strong cross-functional partnerships across organizations and consistently receive accolades on my ability to partner with other teams to influence positive change.
As an Information Security thought leader who understands how to address technology risk while supporting business growth, these experiences align very well with the challenges outlined in this position.
Documents Incident Response plans for cyber security incidents, reviews incidents with teams, documents lessons learned.
Provides timely feedback to other IT Security teams, such as Engineering, Architecture, Risk and Compliance Acts as a general escalation point for IT Security operations.
Proactively identifies security risks and issues and then works across the company to address in a timely manner.
And based on the outcome involved in POC of many tools till its implements in the network.
Owns operational security metrics.
Information Security Analyst
Vmware Software India Pvt Ltd
08.2013 - 02.2016
Monitoring of Security Incidents using SIEM tool- Splunk for analysing logs from Network Devices, Authentication Devices, Endpoints, Email Gateway, and other cloud hosted devices.
Enough skills in malware analysis and reverse engineering using OSINT to find IOC's, TTP's in a sample for blocking.
Experience in decoding obfuscated malware sample to find IOC’s and malware behaviour.
Experience in investigating security issues raised by end users and working with them to resolve issues.
Identifying repetitive false positive alerts and suggesting fine tuning to decrease FP's.
Part of internal SOC/Escalation team which responds to all types of cyber security threats Which represents the face of IT-Security in vmware.
EDR:.
Monitoring EDR security provides an integrated hub for the collection, correlation, and analysis of endpoint data, as well as for coordinating alerts and responses to immediate threats.
Responsible for analysing Endpoint Data Agents such as processes, connections, volume of activity, and data transfers into a central database.
Identifying the attacking hosts through EDR and initiating a change request sequentially for Analysis and Forensics.
Performing actions in sensor groups for additional enhanced user permissions are necessary for isolating and uninstalling sensors and using Live Response.
Investigating in EDR to create, delete, and modify the solutions.
Threat Hunting:.
Deeply analysing emails, blog posts and social media presences to determine what level threat something or someone poses.
Analysing the collected data to determine trends in the security environment of the organization.
Prioritize incidents and cases escalated from SIEM team to Content Development.
Creating and maintain SLAs and metrics for Cyber Threat Hunting.
Working closely with TI and IR teams to proactively and reactively identify IOCs and additional content needed for hunting and response.
Performing gap assessment reviews on network and system resources to identify threat vectors, this includes conducting a tooling reviews and providing recommendations.
Examine artifacts from network traffic and hosts to determine 0-day Attack evidence.
Performing enterprise malware and deep dive analysis on incidents to determine all IOC’s and other technical activities occurred from the incident.
Involved in collecting IOCs from open source investigations significant which are threats specific to VMware and shared intel from industry partners (Threat stream, Crowdstrike, iDefense, etc.).
Email Security:.
Experience in enhancing & customizing email-security solutions for the emerging threats.
Identifying malicious email messages using Proofpoint.
Experienced in monitoring solutions for Email Gateway through Mail delivery system, SPF, DKIM, DMARC, DNS configuration, Content filtering, TLS, Handling Phishing & SPAM attacks.
Information Security Analyst
Wipro Technologies
09.2010 - 08.2013
Ensure a secure computing environment within the organization.
Monitor security violations and investigate security incidents.
Evaluate emerging technologies that might enhance the overall security posture of the organization while ensuring compliance to regulatory requirements.
Manage the SIEM and other security monitoring tools from integration, monitoring, correlating and reporting perspective based on the business needs.
Manage and monitor tools to ensure security of internal and perimeter network while ensuring that adequate packets and network activity information is captured for investigating potential security incidents.
Manage and maintain innovative tools and technologies to protect the organizational computing infrastructure from a variety of advanced persistent threats.
Finding based on Proactive Threat Monitoring attacks effectively using various websites and based on that creating watch lists.
Coordinating with third party consultants and writing IOCs – Indicator of compromise for latest attacks for VAPT patterns.
Collecting required VAPT source of data and creating Incidents.
Oversee the cycle of incident management framework from identification, containment, performing root cause analysis, suggestion and implementation of preventive and corrective controls, perform disk, and network forensic analysis as needed on a case-to-case basis.
Identify files and network traffic for presence of malware, isolate and study suspicious traffic and files for presence of known or zero day malware, analyze the malware in a sandboxed environment and use innovative tools to study the behavior and characteristics and submit the samples to McAfee for developing signatures for the malware.
Incident management and handling skills; including knowledge of common probing and attack methods, viruses, botnets and other forms of malware.
Correlating events from a Network, OS, Applications or IDS/Firewalls and analyzing them for possible threats.
Handle the complete incident management framework cycle right from incident identification, incident containment, performing root cause analysis, suggestion and implementation of preventive and corrective controls and perform disk and network forensic analysis as needed on a case to case basis.
Creating reports and modifying the existing ones for better monitoring process and co-relating the events from different devices for a period of time to identify different alerts of interest namely - DOS, DDOS and so on.
Creating and Managing Rules using watchlist and Filters for Alert generation in SOC environment.
For example Rules for detecting BOT alerts, virus Scans, Logon Failure Attempt etc.
Associate IT Consultant
ITC Infotech
07.2008 - 09.2010
Responsible to deliver solutions to all the security incidents in 3 tier architectures.
Monitoring of Multiple Security Incidents using SIEM (Net forensics) for analyzing logs from Network Devices, Authentication Devices, Endpoints, Email Gateway, and other cloud hosted devices in the ITC Infrastructure.
Responsible for maintaining Gateway Security of ITC Info Tech clients working on Firewalls like Checkpoint and SGS (Symantec Gateway Services) In the 3 tier architecture.
Classify threat severity for the organization and co-coordinate with the leadership for required approval and resolution acceptance.
Creating and regularly updating the Standard Operating Procedure (SOP) documents as per security incidents investigation.
Monitor critical Web servers, for any type of complex web attacks such as SQL injection, Cross-site Scripting, URL interpretation attacks, Buffer overflow attacks etc, use IDS/IPS (McAfee Intrushield).
Expert in handling targeted/large Phishing campaigns by finding and blocking IOC's as part of proactive measures in IMSS Experienced in investigating emails reported by end users and responding with appropriate recommendations and create a rule to block a URL by using websense (URL Filtering) and IWSS(Content Filtering).
Identifying repetitive false positive alerts and suggesting fine tuning to decrease FP's.
Information Security Consultant
Allied Digital Services Ltd
01.2008 - 07.2008
Responsible to provide Managed Security Services for major ADSL Customers.
Liable for Log monitoring for critical assets and analysis of security incidents.
Ensure appropriate escalation and follow-up for security incidents until closure.
Ensure compliance with Service Level Agreements.
Management of security infrastructure and Perform the VA and PT for customers.
Education
Post Graduation Program - Information Security Management
K.J.Somaiya Institute of Management studies and Research
Bachelor of Technology - Electrical and Electronics Engineering
RIT
Skills
Information security
undefined
Timeline
Sr. Manager Information security
Conduent Business services india LLP
12.2018 - Current
Vmware Software India Pvt Ltd
02.2016 - 12.2018
Information Security Analyst
Vmware Software India Pvt Ltd
08.2013 - 02.2016
Information Security Analyst
Wipro Technologies
09.2010 - 08.2013
Associate IT Consultant
ITC Infotech
07.2008 - 09.2010
Information Security Consultant
Allied Digital Services Ltd
01.2008 - 07.2008
Post Graduation Program - Information Security Management
K.J.Somaiya Institute of Management studies and Research
Bachelor of Technology - Electrical and Electronics Engineering