Summary
Overview
Work History
Education
Skills
Certification
Online Profiles
Timeline
Akash Kayyath

Akash Kayyath

Cyber Security
Pune,Maharashtra

Summary

A career-oriented professional with proven years of experience in information security management; responsible for information security awareness and security risk awareness within the organization; A focused individual in charge of information security policies and procedures; has good interpersonal and organizational skills.

Overview

7
7
years of professional experience
6
6
Certifications
3
3
Languages

Work History

Information Security Manager (PIRM Client)

Suzlon Energy
Pune, Maharashtra
2022.03 - Current
  • Identified computer hardware and network system issues, performing troubleshooting techniques for remediation.
  • I oversaw the development and implementation of improvements to support network operations.
  • Increased employee awareness of cyber threats with regular security trainings and informative presentations.
  • Analyze trends in cyber threats to develop proactive countermeasures against emerging attack vectors.
  • Led cross-functional teams in assessing Information & Cyber Security vulnerabilities and risks organization-wide, including third-party risk assessment.
  • Implemented and maintained ISO 27001:2013 standard, ensuring regulatory compliance and adherence to industry standards.
  • Developed tailored training programs to educate employees and stakeholders on best Information & Cyber Security practices.
  • Conducted periodic risk assessments to guide client engagements and support functions in risk mitigation through effective controls.
  • Managed relationships with third-party vendors to ensure security compliance and minimize supply chain risks, including conducting third-party risk assessments.
  • Led incident response efforts for timely identification, containment, and remediation of security incidents.
  • Provided strategic guidance to clients on emerging security threats and trends to enhance security posture.
  • Maintained relationships with key stakeholders and conducted security assessments and testing.
  • Offered technical expertise to remediate vulnerabilities and recommended changes to policies, controls, and processes.
  • Analyzed IT processes for improvements in efficiency and compliance.
  • Stayed updated on regulatory requirements and assessed their impact on internal policies and controls.
  • Conducted internal audits and compliance checks across various IT functions.

Information Security Consultant

Presidio Information Risk Management
12.2021 - Current
  • PIRM helps organizations identify, assess, measure and manage operational and technology related risks encountered in their business and assist in the implementation of information security policies, processes and risk mitigating controls
  • Experience in Information Security Governance,TPRM, Compliance and Security Assessment, with a focus on IT and IS Risk Assessments
  • Conduct periodic Risk Assessment, review the identified/open risk, guide client engagements and support function to treat the risk through effective controls
  • Performing Vendors & Third-party security assessments
  • Assess customers needs and provide assistance using the ISMS Framework
  • Communicate information security goals and new programs effectively with department head
  • Conduct Internal Audits and Monthly Compliance checks at different IT functions such as Service Delivery, IT Purchase, IT projects, servers & systems, and network and security.
  • Conduct Internal Audits for different clients as per requirement
  • Hands-on Business Continuity Planning and Disaster Recovery implementation.
  • Identified critical vulnerabilities in systems through regular penetration testing, mitigating risks before exploitation could occur.
  • Played a crucial role in setting annual information security budgets, ensuring adequate funding for necessary tools, personnel, and training.

Information Security Officer

Only B2B
11.2019 - 12.2021
  • Only-B2B is a Lead Generation company that offers end-to-end sales enablement services, including lead scoring, nurturingand appointment setting.
  • Maintained availability, integrity, and confidentiality of all Only B2B computing environments, web, networks, systems, and information assets encompassing 100+ systems
  • Implemented the Information Security Management Framework (ISMS) for design and maintenance of a coherent set of policies, processes and systems to manage risks to the information assets
  • Conducting Information Security Training & Assessment Test for new employees and existing employees as per the scheduled interval
  • Maintain the Datacenter infrastructure, servers, routers, switches, firewall, phone systems and network area storage
  • Conduct Vendor Evaluation, Risk Assessment & Review with the Head
  • Creation and Updating of ISMS Policy and Procedure as per the changes in process
  • Knowledge of Risk Assessment; Security policy; Organization of Information Security; Asset Management; HR Security; Physical and Environmental Security; Communications and Operations Management; Access Control, IS Incident Management; Business Continuity Management and Compliance.
  • Optimized encryption protocols for secure data transmission between corporate networks, safeguarding critical assets from unauthorized access during transit.
  • Engineered, maintained, and repaired security systems and programmable logic controls.

IT Consultant

MindTech Services
11.2018 - 11.2019
  • Deliver remote infrastructure support and other IT services to minimize business losses, upgrade continuity, agility and deliver excellent
  • Develop and maintain all manner of IT systems for small business clients
  • I worked closely with clients to analyze IT system requirements, their information technology needs and their resources in order to plan IT projects and fulfill their expectations
  • Troubleshoot and resolve PC, and network device issues, including; connectivity, email setup and new user training
  • Solved clients IT issues: determined changes, recommended quality software, projected modifications of software, hardware and networking
  • Researched and documented existing and new processes for IT Support
  • Support with the implementation of GRC Tool and ISMS Activity.
  • Optimized network performance through proactive monitoring, configuration adjustments, and hardware upgrades, resulting in improved connectivity and speed.
  • Planned and developed interfaces that simplified overall management and offered ease of use.

Network Engineer

Pangea Global Services
10.2017 - 11.2018
  • Serve innovative marketing strategies to B2B clients, including profile advancement, lead generation, sales synchronization, and more, by media and content distribution services
  • Provided complete end-to-end engineering and installation of route-based IP network solutions.
  • Planned, implemented, and maintained a Windows domain based infrastructure
  • Designed and implemented local and wide-area networks
  • Performed network security administration duties to solve issues
  • Managed the day-to-day IT troubleshooting for users both locally and remotely.
  • Analyzed and defined network requirements, optimization, and support for the organization.

Education

Master of Computer Applications - Computer Science

Kalinga University, Naya Raipur, India
08.2019

Skills

    IT Security & Compliance

undefined

Certification

Certified TUV Information Security Lead Auditor

Online Profiles

LinkedIn, https://www.linkedin.com/in/akash-k-132299150/

Timeline

Information Security Manager (PIRM Client) - Suzlon Energy
2022.03 - Current
Information Security Consultant - Presidio Information Risk Management
12.2021 - Current
Information Security Officer - Only B2B
11.2019 - 12.2021
IT Consultant - MindTech Services
11.2018 - 11.2019
Network Engineer - Pangea Global Services
10.2017 - 11.2018
Kalinga University - Master of Computer Applications, Computer Science
Akash KayyathCyber Security