CISM Certified Information Security Manager with a proven track record in leading and mentoring security teams, developing and implementing security policies, and managing comprehensive risk and vulnerability assessments. Adept at acting as a primary security liaison for clients, ensuring compliance with ISO 27001 standards, and executing effective patch management, malware protection, and user access controls. Skilled in conducting internal audits, providing detailed root cause analyses, and driving proactive security measures to mitigate future risks. Strong communicator with a strategic approach to safeguarding organizational assets and enhancing overall security posture.
Led and mentored the information security team, providing training, guidance, and performance evaluations to enhance team capabilities and effectiveness.
Acted as the primary security liaison for Kyndryl clients, conducting gap analyses between customer security policies and Kyndryl offerings based on ISO 27001 standards.
Directed the preparation and implementation of essential information security policies, standards, procedures, and guidelines in collaboration with Information Security Leads.
Managed technical specifications, performed risk assessments, vulnerability management, patch management, and regular health checks.
Conducted vulnerability scans and collaborated with teams to remediate identified vulnerabilities.
Coordinated with clients to request extensions or exceptions for delayed patch implementations.
Regularly reviewed security status with account teams, assessing risks, issues, incidents, outstanding activities, and planned changes.
Provided root cause analysis (RCA) and action plans for audit exposures, ensuring all findings were addressed and proactive measures implemented to prevent future issues.
Evaluated security technologies to ensure adherence to customer policies and standards.
Created non-compliance records for any findings and ensured follow-up until resolution.
Conducted internal audits to minimize audit exposure and findings, and assisted auditors in reviewing security documentation, processes, and client agreements.
Ensured the environment was updated with the latest patches, working with clients to address any implementation delays by raising extensions or exceptions.
Partnered with support teams to ensure malware and antivirus tools were updated and findings were remediated.
Collaborated with the ID Admin team to ensure compliance of all user and privileged IDs with security policies.
Coordinated with platform teams to perform server health checks according to technical specifications agreed with clients.
Executed vulnerability scans and worked with teams to remediate identified vulnerabilities.
Monitored file integrity on servers, investigating changes within the environment.
Partnered with risk managers and clients to create and regularly update risk documentation for any identified risks.
Assisted auditors in reviewing security documentation, processes, and client agreements.
Initiated remediation actions to resolve deficiencies identified during audit fieldwork and ensured proactive measures were in place to avoid future findings.
Ensure Implementation of information security policies, standards, procedures throughout Conduent information security infrastructure.
Perform User access Management Reviews: Active Directory Dormant, User recertification, Developer account, Firecall and SAFE (Privileged) Account review for all domains.
Perform Vulnerability Scans and ensure remediation is performed.
Perform access management for Conduent Clients
Perform PGP Encryption Review and Ensure all users are PGP compliant.
Identify the gaps in the existing environment and develop solutions to mitigate the identified gaps.
Review security status with Management on a regular basis that includes review of risk, issue, incident, and outstanding activities, current and planned changes.
Act as first point of contact for any security incidents occurred during off prime hours.
Perform internal audits on all supported business units.
Assist the external auditors and provide all the required documentation. Ensure all audit findings are mitigated and ensure proactive measures are taken to avoid any findings in the future.
Serve as security focal for IBM clients, performing the gap analysis between customer security policy and IBM offering (Based on ISO/IEC 27001:2013)
Leads or commissions the preparation and authorizes the implementation of necessary information security policies(ISec, GSD), standards, procedures and guidelines, in conjunction with the Security Committee
Responsible for managing security control, performing risk assessment, incident management, vulnerability management
Study customer security architecture, identify the gaps/risk in the existing environment and develop solutions to mitigate the identified gaps/risk
Review security status with account team on a regular basis that includes review of risk, issue, incident, and outstanding activities, current and planned changes.
Evaluate security technology to ensure compliance to customer policy and standard
Work with SMEs/Security Teams to implement agreed security controls
Oversight of patch management
Oversight of malware and antivirus management.
Scanning the servers as per the IT security Documents (GSD,ISEC, ITCS 104)
Auditing the client servers to make it compliant
Initiate remediation actions to resolve deficiencies pointed out as part of audit fieldwork.
Assisting Auditors to review the security doc, and Client agreement for the competency.
Providing RCA and Action plan for any audit exposure.
Facilitated voice-based processes on MAS/VPN connectivity utilizing Cisco Secured Services Client, ensuring seamless access to critical systems such as Mainframe Applications and Microsoft Outlook. Managed network connectivity and router configuration to uphold optimal performance standards. Oversaw ID administration through Active Directory and SMTools for Bank of America employees, ensuring secure access and data integrity. Proficiently logged incidents in Peregrine Service Centre and Maximo, meticulously tracking them until resolution. Adhered to resolution norms and escalation protocols, promptly escalating incidents when necessary to maintain operational efficiency.
CISM - Certified Information Security Manager