Skills
• Vulnerability Management
• Threat Modeling, Hunting and Intelligence
• Risk Assessment and Management
• Identity and Access and Change Mgmt.
• Disaster Recovery & BCP
• Server Platform – Window OS & Command Line Interface, LINUX, UNIX & AS400
• CIS Controls/ OWASP Top 10
• Web, Application & Database Security
• Communication (verbal and written)
• Firewalls, IDS/IPS, SIEM, DMZ, Zero Trust, Purdue Model & Proxy Systems
• Endpoint Detection & Response (EDR /XDR)
• Research on Threat landscape, Emerging Technologies & ICS
• Cloud-based services (IaaS, PaaS, SaaS)
• Risk Assessment and Management
• Information Security Management
• Incident Response Management
• Information systems Auditing
• Compliance Audits & Best Practices
• ISO 27000/SOC1-2/PCI/GDPR
• NIST CSF/NIST 800-53/NIST RMF
• Project Management
• Organizing & Problem Solving
• Analytical, Collaboration & Customer Service
• Interpersonal & listening
• Development of Policies, Standards Procedures & Guidelines
• Multitasking & Prioritization skills
About
Dynamic and results-oriented IT security professional with over 8+ years of experience in designing, implementing, and managing robust security solutions to safeguard organizational assets. Adept at identifying vulnerabilities and developing proactive strategies to mitigate risks effectively. Skilled in conducting security assessments, defining security policies, and ensuring compliance with industry regulations. Proven track record of successfully enhancing cybersecurity posture while aligning with business objectives. Excellent communicator with a collaborative approach to working across teams to achieve organizational security goals while implementing and promoting an information security and risk-aware culture