• An established professional with skills in managing IT Security and operations to ensure that the network and the infrastructure are up & running and as a whole provides a high degree of reliability and availablity.
• Wealth of expertise entails: IT Security and Operations, Project
Management, Stakeholder Management, Total Customer Experience & Customer Satisfaction in a SaaS model, SOC (Security Operations Center) Management, IT Infrastructure Management, People Management.
• Expertise in Managing Cyber Security Operations with understanding of multiple security devices & tools like – SIEM, Vulnerability Management,Threat Management, EDR, SOAR, Security Incident Management, Proxy Solutions, End-Point Protection, Firewalls, IPS-IDS, and Cloud Security
• Comprehensive understanding about Project Management activities encompassing planning, optimization, scope definition, estimation, resource administration, process management, and compliance with quality standards while ensuring project delivery within time, cost and quality specifications.
• Highly resourceful at planning & implementing information security systems, addressing end-point protection, governance risk and compliance, security information and data security,
• Proven capabilities in managing end-to-end process management, custom designing IT solutions and supporting end users & developing technical staff to achieve performance objectives
• Ability to thrive in working in a fast-paced, technologically forward leaning environment and are not afraid to push the boundaries of security capabilities.
• Incisive acumen in implementing appropriate as well as technology-based solutions for enhancing functional efficiency of the organization and achieving business excellence; proficiency in identifying & eliminating NVA’s in the process
• An Effective Leader with strong team building, coordination and problem-solving & analytical skills .
• Worked as a Security Operations Lead (SOC); consulting & architecting the infrastructure security design &
implementation project; managing Cloud IT Operations for 200+ customers & escalations
• Managing all aspects of projects including planning, engagement & administration
• Understanding and knowledge of industry standards and industry frameworks (e.g., ISO 27001, MITRE ,NIST).
• Attending technical meetings, Change Control Boards, Technical Review Boards, and System Security Working Group meetings.
To address issues related to cyber security and vulnerabilities
EDR Management:
⮚ Installing, configuring, and deploying EDR endpoint agents.
⮚ Integration with SEIM leveraging the EDR App and syslog.
⮚ Executing POCs on the most recent agent version across multiple OS platforms.
⮚ Examining the performance challenges seen during POCs.
⮚ Validate whether the EDR Agent has been successfully installed and is reporting.
⮚ Preparing plans for agent upgrades.
⮚ Management of EDR Host and Host Group.
⮚ Working on threat hunting queries.
⮚ Defining exclusions based on the requirement.
⮚ Management of applications using an EDR solution.
⮚ Troubleshooting on Agents not communicating to console.
⮚ expertise in threat analysis and malware.
⮚ Defining Policy for Detection and Prevention.
⮚ Monitoring of Incident and Detection.
⮚ Defining policies on Real Time Response and Network Containment.
⮚ Defining device control policies in accordance with ISO and organization requirements. Review of EDR clients and identify rogue system without agents.
⮚ Incident Investigation
DLP Management
⮚ Attending Client Meeting for DLP requirement.
⮚ Implementation of DLP policies as per client requirement
⮚ Reviewing the policy as per the schedule and fine tune the policies for data in use and data in move.
ATP Management
⮚ Implementation & Integration of Advance threat protection tool.
⮚ Working on regular critical security incidents based on ATP report.
⮚ Ensuring and remediating the endpoints and ensuring infrastructure is secured.
Web Filtering Management
⮚ Managing multiple location server.
⮚ Creating policy based on the project/user requirement.
⮚ Random audits on internet access.
⮚ Roaming profile policy for laptops.
⮚ Software download restriction for license compliance.
⮚ Monthly configuration backup.
⮚ Time based policy for online trading sites.
⮚ Regular upgrades of patches and new release.
Vulnerability assessment
⮚ Monthly scanning of infra server for VA and Missing MS and application patches.
⮚ Generating reports of VA and Missing patches.
⮚ Co-ordination with respective team for patch deployment.
⮚ Find the gaps of VA and closing the same. ⮚Collecting,analyzing,interpreting,evaluating and integrating vulnerability data from multiple sources.
IT / SOC Operations