Seasoned Information Security Officer with experience in implementing, overseeing, and maintaining comprehensive information security strategies. Strengths include strong leadership skills, a deep understanding of cyber security risk, and the ability to effectively communicate complex technical information to non-technical stakeholders.
Notably influenced past organizations by streamlining operational efficiencies and strengthening cybersecurity posture. Several years of experience designing and implementing security solutions in high-availability environments.
Ensure the day-to-day operations and maintenance of the organization's cybersecurity infrastructure and controls to protect systems, networks, and data.
Ensure coverage and effectiveness of security operations and deployed solutions.
Ensure optimum security, availability, performance, and capacity of security solutions under management.
Ensure and maintain up-to-date documentation, including SOPs, architecture diagrams, etc. To remove dependency on people.
Manage configuration changes and deployments according to established change management processes, ensuring minimal disruption, and adherence to best practices.
Ensure hardening, the latest stable version, and security patches of security devices and solutions.
● Track EOL/EOS and ensure that there is no technology obsolescence.
Ensure the resolution of incidents and outages, coordinating with internal teams and external vendors to restore service within agreed-upon SLAs.
Manage escalations and run the smooth operations of security solutions.
Ensure relevant processes are followed for change, incident, and daily operations.
Identify and analyze pain areas in existing security operations, and implement improvements.
Manage operational issues that require design and technical inputs.
Ensure compliance with regulatory requirements, security policies, and security frameworks such as ISO 27001, NIST, or CIS.
Publish the relevant dashboards and status updates.
Escalate deviations and violations in a timely manner.
Budgeting CAPEX and OPEX.
Remain current with the organization's security policies, the latest security advisories/threats, industry best practices, and developments in cybersecurity, and recommend and implement best practices and technologies to mitigate emerging threats.
Good understanding of cybersecurity tools like SIEM, PAM, UEBA, and deception.
Conducting a phishing drill activity for regular users to enhance information security awareness measures.
Hierarchy Level, Instrumental in managing various aspects of IT Security operations
C|CISO - Certified Chief Information Security Officer
CISM – Certified Information Security Manager
CEH – Certified Ethical Hacker
IIBF Certified
TrendMicro Deep Security Certified Professional.