Summary
Overview
Work History
Education
Skills
Accomplishments
Certification
Timeline
Profile Highlights
Expertise
Published Py Project
Preferred Job Location
Declaration

Rajarshi Bhattacharyya

Cybersecurity Architect
Kolkata,West Bengal

Summary

Erudite leader and subject matter expert, currently playing dual role as chief architect and portfolio manager for Threat and Vulnerability Management Services. Equipped with an advanced certification in exploit research, and 17 years of total experience in Information Technology, steering both TVM engineering and 24x7 global operations

Responsible end to end for automated as well as manual assessments for infrastructure components including penetration testing, periodically defining strategies as well as improvising tactics, to achieve organization goals for secured digital business
Being thoroughly hands on, highly motivated to direct/manage information security research oriented functions and jobs, that need in depth theoretical knowledge coupled with innovation and deep problem solving ability

An avid reader, a serious student and a humourmonger

Overview

5
5
Certificates
17
17
years of professional experience
4
4
years of post-secondary education

Work History

Associate Director

Cognizant Technology Solutions
Kolkata, West Bengal
12.2021 - Current

Highlights:

  • Service Now Security Operations: Established Vulnerability Response and Integrated Threat Management with SNOW VR module for 100K+ assets; Established API based complete integration of infra and app scanning engines(Qualys, Nessus and Acunetix); built use cases and worked extensively with development team; lead testing of each sprint and UAT; developed logic for vulnerability grouping and automated incident ticket creation in SNOW and BMC ITSM framework; actively engaged in building workflow for connecting SNOW GRC module with VR
  • Vulnerability and Compliance Management for End User Computing Systems: With solid understanding of Tanium architecture and administration, completed project planning, Proof of Concept, UAT and large scale implementation of Tanium Comply module for all Business Unit desktop/laptops; full telemetry reporting of system performance information and CVE details using Connect capabilities; established CIS Benchmark standard policy compliance and hardening for Windows and MAC endpoint OS; set up data warehousing through SQL DB integration and custom reporting using Tableau
  • Database Hardening and adoption of CIS Benchmark Standard for enterprise data base systems: Defined baseline control sets and values for Oracle DB, IBM DB2, Microsoft SQL Server; ran extensive performance impact testing; implemented quarterly secure compliance scanning of production data base systems using QualysGuard and CyberArk integration; developed exception and risk management guideline for DB systems

Senior Manager

Cognizant Technology Solutions
Kolkata, WB
11.2018 - 11.2021

Highlights:

  • Cognizant Extranet Security: maintaining 100% compliance for over 24 months - remediated all exploitable as well as critical/high/medium findings within SLA; established daily discovery of extranet segments and daily scanning of all live hosts
  • Business Reputation Management: Cognizant closely follows third party risk management platforms such as BitSight, Security Score Card, Risk Recon etc. to continuously stay ahead in business reputation. Responsible for running manual validation, false positive elimination followed by driving closure of issues found with Application Header, Server Software, Insecure Systems, Open Ports, PKI issues and SSL/TLS configuration. Sustaining score of 800 on BitSight and 95 on Security Score Card
  • Define, implement and maintain global Threat and Vulnerability Management Standard in light of NIST CSF(800-53): authored current and last two versions of standard; developed in depth technical operations guide to adhere to the standard
  • Define, implement and maintain SOP for critical/emergency threat response, including Zero Day vulnerabilities: Defined emergency situation as per TVM capabilities and build workflow to support analyzed and orchestrated response
  • Vulnerability assessment tools/platform management: Qualys, Tenable.io, Rapid7, Nessus, Acunetix 360, SNOW VR, Skybox, Burp Enterprise, DefectDojo
  • Engineering infrastructure and application assessment capabilities for Corporate as well as Client/Customers: On demand establishment of TVM functions, tool/module selection aligned with budget and building remediation governance as per client MSA; traditional scanner based scanning Vs agent based real time visibility; custom signature development for hardening; new exploit validation/testing and mitigation control identification/testing; established real time visibility to threats on server estate through deployment of Qualys Cloud Agent on 30K+ Windows and Linux servers, with proxy and gateway services where ever required
  • TVM for Enterprise Cloud: Inventoried all servers and network devices deployed in cloud through manual discovery as well as API based connector for Azure and AWS data centers; established workload protection with traditional scanning in parallel with agent based real time assessment
  • Define and implement Container Security Standard; develop Operations Guide for assessing components of microservice architecture
  • API based integration, data warehousing and multiplatform communication
  • Continuous governance-identification and reporting of vulnerabilities for Cognizant Corporate, Cognizant Managed Cloud Infrastructure and Accelerator platform
  • Threat Analysis and Enterprise Security Advisory Service: Established team to review Threat Intel platforms 24x7 for emerging threats and send global security advisories for manjor OEM and application vendors; contextualization of critical threats for enterprise environment; risk level identification - likelihood and impact analysis in the view of enterprise architecture
  • Policy Compliance/Hardening: Developing and testing CIS Benchmark Standard templates for Active Directory environment, Windows Sever 2021 R2, 2016 and 2019, RHEL, CentOS, OEL Custom controls and regex; monthly scanning for all enterprise server and policy drift report; calibrating controls and values for enterprise infosec standard
  • Risk Based Vulnerability Management- QualysGuard VMDR, Kenna Security VM & AppSec adoption:
  • Penetration Testing: Developed and implemented enterprise infrastructure and application penetration testing Standard; published SoP and established technical team to run quarterly external automated and manual penetration testing for all discovered domain, sub-domain and IP addresses; tool-stack and methodology standardization; manual false positive elimination; BoD/Client reporting; internal PT for isolated labs/ODCs/Application Development center; extensive hands on experience of execution of discovery and exploitation with standard opensource and licensed tools
  • Audit Support: ISO 27001 ISMS -have been the primary auditee for global TVM functions and no non-conformity or observation in last 3 years; continuously supporting clients and business for all audits touching control statements related to Vulnerability Management and Penetration testing; over the year, supporting Internal Audits and 3rd party audits

Manager

Cognizant Technology Solutions
Chennai, TN
08.2016 - 11.2018

Highlights:

  • Hands on Vulnerability Scanning/Reporting –Qualys, Nessus, Nexpose/R7, OSCAP Workbench.
  • Critical Vulnerability and Zero Day – response orchestration.
  • Scanning cloud Resources and Containers – new technology deployment.
  • Critical Architecture Review and Exception Management through GRC Tool.
  • Audit support – corporate and customer side.
  • Training, building and leading subject matter expert teams for VA/PT.
  • API based automation and Statistical Analysis.
  • Firewall rule and configuration compliance using Skybox.
  • Facing ISO 27001 ISMS audit as portfolio manager.
  • Supporting client side audit with artifacts for SOC 2, SSAE 16, PCI DSS.
  • NIST Cyber Security Framework, CIS Benchmark, STIGS DISA.

Senior IT Services Analyst

ASM Technologies Ltd
Chennai, TN
01.2013 - 08.2016

Highlights:

  • Deployment, Configuration and Management of Palo Alto, Check Point and ASA Firewalls in large heterogeneous environment; firewall rule and configuration audit;
  • Managing Palo Alto IPS engine and SoC integration of alerts
  • Managing, monitoring and configuring Juniper SSL VPN (SA/MAG) devices.
  • Network Connect and JunOS Pulse client configuration and deployment.
  • DNS/DHCP Infrastructure management with IPAM (BT and Infoblox) Remote and Instant Access Point – deployment and configuration.
  • Aruba WLAN controller deployment and configuration – using Aruba Airwave.

Senior Network Engineer

CSS Corp
Chennai, TN
06.2011 - 12.2012

Highlights:

  • L-3 TAC engineer for Aruba WLAN Management Solution (Airwave Management Platform).
  • Escalation engineer for NMS Server (Linux, Apache, PG SQL, Perl) Support for mixed vendor Wireless LAN environment.
  • Critical troubleshooting for LAN controller and Access Point Problems.
  • AAA server/platform(Amigopod/ClearPass) support for major customers (Google, Intel, Target Corp) Network management trough SNMP trap and syslog.
  • Configuring Campus/Remote Access Points and LAN controllers from central management platform.
  • Ethereal based analysis and protocol troubleshooting.

SOHO Support Engineer

IBM Daksh
Kolkata, WB
05.2010 - 12.2010

Highlights:

  • Debugging Software configuration/usage issues with Microsoft Windows based software.
  • Troubleshooting OS related issues, OS re-installation, dual boot (XP, Vista, Windows7), registry twigs.
  • Troubleshooting Printer/scanner connectivity issues.
  • Email client configuration and troubleshooting (Outlook, Eudora, Incredimail).
  • Debugging browser issues(IE/Chrome/Firefox/Safari).
  • Antivirus and Malware removal tools: Norton, Mcafee, Comodo, Hijak This, Super Antispyware, Malwarebytes, Trend Micro, Trojan Removar.
  • Configuring SOHO routers (Lynksys, Belkin, Netgear, 2wire, Dlink).

Desktop Support Technician

Compuvision
Kolkata, WB
01.2000 - 04.2005

Highlights:

  • Understanding customer's requirement and proposing quotations for desktop computer platforms.
  • Purchasing and assembling hardware for desktop computers.
  • Installing OS and Software per customer requirements.
  • Printer installation (HP, Xerox, Epson) - inject and dot-matrix printers.
  • Configuring email client software.
  • Complete maintenance and troubleshooting of SOHO devices.

Education

B.Tech - Electronics and Communication Engineering

Bengal Institute of Technologyand Management, Bolpur, West Bengal, India
06.2005 - 06.2009

Skills

    Threat and Vulnerability Management

undefined

Accomplishments

  • Global Software Asset Inventory: Using QualysGuard scanning information gathered, built software asset inventory for entire corporate landscape
  • 100% external compliance and PCI compliant for over 24 months: Closed all Critical, High, Medium and all exploitable external vulnerabilities within SLA
  • Get2Green Project:96.5% compliance maintained for internal asset patching/remediation
  • Implemented Environmental CVSS for critical Health Care application hosting environment and introduced risk based governance
  • Emergency and Zero Day process development: Developed SoP and workflow(orchestration and triaging) to handle any emergency/critical zero day;
  • 97% cloud agent coverage: Deployed Qualys Cloud Agents on 97% total servers in global footprint and enabled realtime visibility into risk posture
  • Global Asset Discovery project and CMDB population: Extensively leveraged QualysGuard and Tanium discovery techniques to build CMDB in SNOW

Certification

GIAC GXPN[Exploit Research and Advanced Penetration Testing]

Timeline

Associate Director - Cognizant Technology Solutions
12.2021 - Current

GIAC GXPN[Exploit Research and Advanced Penetration Testing]

07-2020
Senior Manager - Cognizant Technology Solutions
11.2018 - 11.2021
CCSK V4 - Certified
08-2018

ISO 27001 LA

06-2018

CLIP BS 10012:2017

05-2017
Manager - Cognizant Technology Solutions
08.2016 - 11.2018
Senior IT Services Analyst - ASM Technologies Ltd
01.2013 - 08.2016
Senior Network Engineer - CSS Corp
06.2011 - 12.2012

CCNA

03-2011
SOHO Support Engineer - IBM Daksh
05.2010 - 12.2010
Bengal Institute of Technologyand Management - B.Tech, Electronics and Communication Engineering
06.2005 - 06.2009
Desktop Support Technician - Compuvision
01.2000 - 04.2005

Profile Highlights

  • Proven leadership traits and high competency in collaborating with senior management, for providing strategic input aligned with enterprise security mission and vision; member of CSO technical advisory board for emerging threats and informed defense
  • Professional with in depth knowledge of information security, offering comprehensive experience in the areas of Information Security Management, IT Infrastructure Management, ITIL Process, Budgeting, Procurement, Network and Information Security platform/toolstack Administration, ISMS Audit
  • Thoroughly experienced in complete Project Management Life Cycle including Initialization, preparing project roadmap, effort and time estimation, SOW formulation, RFP Responses study, Costing & Budgeting, Technology Assessment and Business Case Preparation, etc.
  • Years of demonstrated ability to collaborate with peers for improving Information Security Services through effective Incident Management, Change Management and Problem Management; focused on Continual Service Improvement, Service Operations, Service Transition, Service Design & Strategy
  • 360 degree people manager taking care of wide range of task starting from recruitment through resource on boarding, goal settings, performance review and appraisal, training and competency building, resource utilization, capacity planning etc. Currently managing a 33 member team with 4 slabs of reporting


Expertise

  • QualysGuard, Tenable.io/Nessus and Rapid7 - complete discovery, scanning, reporting; deployment and solution engineering
  • OSINT and Recon Tools: Burp/Zap, recon NG, Whois, ARIN Lookup, Shodan, GHDB, Maltego,
  • Nmap and scripts; Kali Linux and Kali Tools; shell scripts
  • OWASP Top 10 and manual testing: Top10 and testing framework; XSS and SQL,HTML Injection
  • Metasploit: Framework organization, server/client side attacks, Meterpreter and scripting, DB integration and automated exploitation, post exploitation, token stealing and impersonation, backdoors/rootkits, pivoting, exploit research and importing exploits; Metasploit templates
  • Powershell: scripting, modules and jobs; PS and WMI; Windows API and PS; PS and COM; interacting with registry; recon, scanning and exploitation; porting exploits in PS; PS and Metasploit; post exploitation: backdoors, privilege escalation; passing the hash, PS remoting, webshells and persistence; PS Empire
  • Python and Scapy: Scripting, system programming and security; network security - sniffers and injectors; attacking web app; exploitation techniques, malware analysis and reverse engineering; attack task automation
  • Debugger: GDB in depth; Oly, Immunity and WinDBG; Ghidra basics
  • Bug Bounty/CTF: Regular at HackTheBox and VulnHub
  • Wireshark, Ettercap/Bettercap: etherial based protocol analysis and troubleshooting; MITM
  • Kenna and DefectDojo: API based integration of infra and appsec tools; threat to risk translation; environmental scores
  • Prisma Cloud for Container Security: Cloud Workload Protection - security at build, ship and run phase; defender concepts and operations
  • Fuzzing: Types of fuzzing; code/block/branch coverage; basics of American Fuzzy Lop on gcc compiled source code; building protocol grammer with Sully and intelligent mutation fuzzing
  • Firewalls/VPNs/IPS/IDS: Solid hands on experience in deployment, configuration, management and monitoring of Check Point, CISO, Palo Alto and Juniper firewalls; rule and configuration review(Skybox); firewall operations and log monitoring; Snort and Snort Rules; Palo Alto and IBM IPS; signature/detection management and throughput measurement; custom signatures
  • Enterprise Wi-Fi PenTesting: WLAN auth bypass, cracking WLAN encryption and attacking infrastructure, 802.1x, EAP, LEAP, PEAP, EAP-TTLS, client based attacks and break into client, enterprise worm, botnets/backdoors
  • Active Directory and Red Teaming: AD enumeration, Local Privilege Escalation , Domain Privilege Escalation, Lateral Movements, Domain Persistence and Dominance, Cross Trust Attacks, Forest Persistence, Monitoring, Defense and Defense bypass
  • Windows Exploitation and Mitigation: Windows core architecture; Kernel and User mode; important APIs and dll files; linking and loading; PE/COF; IAT/EAT; TIB/PEB and SEH; DEP, Stack Canaries; PEB randomization, LFH; ASLR; SEH overwrite; defeating DEP with ret2libc, trampolines and ROP; stack pivoting; ROP chains and ROP gadgets; Windows shellcode
  • Linux Exploitation, Reversing and Mitigation: Linux core architecture and System Calls; memory and CPU registers; stack operation, call instruction, prologue and epilogue; linkers and loaders and ELF; PLT and GOT and object dump; shellcode basics, writing shellcode and removing nulls; linux privilege escalation and SUID binary; ret2libc and ret2sys; DEP bypass and ROP; stack canaries and manually defeating canaries; ASLR and hacking ASLR with LDD; ASLR bruteforcing

Published Py Project

Cognizant needed to import HPE Fortify scanner results/reports inside OWASP Defectdojo, a popular open source vulnerability management tool(https://owasp.org/www-project-defectdojo/). The parser for Fortify scanner was not available at that time and hence needed to write the parser in Python. It is available for use and published here: https://github.com/DefectDojo/django-DefectDojo/blob/master/dojo/tools/fortify/parser.py

Preferred Job Location

Kolkata, West Bengal

Declaration

The profile and the content presented here are true to the best of my knowledge.

Rajarshi BhattacharyyaCybersecurity Architect