- CLIENT: CITI Bank, Singapore
- Role: Project Manager
- Responsible to manage team of 25+ resources.
- Vulnerability/Exceptions Analysis - Conduct in-depth checks of various data sources to identify In-Scope Applications that have breached or have overdue exceptions.
- Root Cause & Impact Analysis - Conduct thorough assessments of vulnerabilities/exceptions to determine the underlying causes and evaluate their potential impact on business operations.
- Technical Advisory - Work with various stakeholders to find the best solution and plan the remediation like the library version to be used as per NVD(National Vulnerability Database) standards.
- Centrally manage the remediation of exceptions.
- Optimized solution considering short term tactical and long-term solutions.
- Risk Prioritization - Emphasizing the prioritization of vulnerabilities based on risk to business operations, ensuring high-risk issues are addressed promptly.
- Secure Coding Practices - Promote secure coding practices among development teams to reduce vulnerabilities in applications.
- Third-Party Risk Management - Assessing and managing risks associated with third-party components, libraries or services used in applications and suggesting alternatives.
- Reporting & Metrics - Prepare comprehensive reports that summarize vulnerability status, remediation progress, and compliance metrics.
- Present Weekly Status to stakeholders highlighting critical issues and remediation timelines.
- Cross Functional Collaboration - Collaborate with LOBs & other stakeholders to check for open vulnerabilities and ensure timely closure. Work alongside Application, Cyber Defense & R&C teams to align on security priorities.
- Continuous Process Improvement - Identify and document best practices, lessons learned and improvement opportunities in scanning, analysis, and remediation workflows.
- Implementing Internal and External Automation tools to proactively detect and swiftly remediate vulnerabilities.
- Major Information security service areas can broadly be classified as below
Vulnerabilities - GEM, CVM, VTM, SBT, VA Issues
Application Compliance - CDQR, Key management, FID, TLS Ciphers, BCM
Reporting/Score Cards - GIMSR CSRA, MCA, CAMP
Middleware Audit and Compliance - VTM, BCM, Non-Certified MW Products n Versions