Experienced Cybersecurity Professional with 5 years of success, specializing in ISO 27001 implementation, auditing, and offering expert guidance in information security. Skilled in risk assessment, consulting, and demonstrating leadership qualities in leading cloud architecture reviews for robust security. Responsibilities encompass leading Data Centre Reviews, Cloud Disaster Recovery planning, API security, and ensuring alignment with company policies. Effectively oversees Risk Assessment, Risk Treatment Plan, and Vulnerability Management, focusing on mitigating security risks, particularly in banking payment systems, utilizing a robust risk management framework
Overview
5
5
years of professional experience
1
1
Certification
Work History
Cyber Security Consultant
Network Intelligence India Pvt Ltd.
01.2019 - Current
Implemented and maintained the principles of the CIA triad (Confidentiality, Integrity, and Availability) across all cybersecurity strategies and protocols, ensuring comprehensive protection of organizational data assets and seamless operational continuity.
Explained the purpose of an Information Security Management System (ISMS) and elucidated the processes involved in establishing, implementing, operating, monitoring, reviewing, and improving an ISMS as defined in ISO 27001 to all levels of the organization.
Planned and executed operational audits of various business areas using a risk-based audit methodology.
Assessed security gaps in the current operating procedures against policies, standards, and leading practices.
Tested the design and effectiveness of internal controls by completing walk-throughs of business processes.
Prepared audit reports reflecting opinions on the effectiveness of system processes, non-conformities, and the effectiveness of activities carried out.
Proficient in Application Security, Data Security, Infrastructure Security, and Network Security with a strong understanding of OWASP guidelines, methodologies, and the NIST Cyber Security Framework.
Conducted thorough vulnerability assessments and penetration testing to identify and mitigate potential security risks, resulting in improved system resilience.