Candidate Name
Over 20 years of experience in Cyber Security Consulting, Information Security Audit Management as well as Information Security Management for large organizations.
Successfully executed consulting engagements in diverse areas such as data security, vulnerability management, application security, privacy assessments, cloud security and IT audit assignments
Governance ,Risk & Compliance
ISMS – Information risk management program development, integration with business objectives, awareness and reporting, measurement, metrics and executive reporting
IT Audits & Assessments, Control Testing, ITGC including process reviews, recommendations & implementation roadmap, real-time support for external audits. Key skills required include Risk Management, GRC, Risk Assessment, NIST, Risk Compliance, External Audits, and Business Process Re-engineering
Privacy
GDPR – Worked with security office in conducting GDPR assessments to determine organizational readiness for GDPR. Key activities include assessment of processes around data controller & processor responsibilities, consent management, definition of data retention policy
Cloud Security
Defined policy for MFA rollout on Azure Active Directory Services for a Dutch logistics company
Identifying Business Continuity Risks related to cloud migration of key business applications for a large Indian Bank.
Vulnerability & Threat Management
Participated in infrastructure and application vulnerability assessments to identify, classify & rate vulnerabilities and suggest mitigation
Defining a framework for DR for ransomware attacks for an Engineering Company.
Security Operations Center
As a Cybersecurity Program Manager, was responsible for setting up a SOC and also for oversight across the Design, Build and Operate stages.
Certifications such as CISSP, CCSK v4, ISO 27001 LA, BS 25999 LA, ISO 22301, ITIL v3, Certified Ethical Hacker v6, RSA Certified Security Professional, Integrated implementation-ISMS & BCMS, Microsoft Azure Fundamentals.
Contributed as a lead author in a case study document titled ‘Top Threats to Cloud Computing: Egregious Eleven Deep Dive’ on cloud security in Cloud Security Alliance (CSA) website in 2020. Earlier, in 2019 was mentioned as a reviewer for the whitepaper titled "Best Practices in Implementing a Secure Microservices Architecture" also published on CSA website.
02/02/2026
01/06/2014
01/10/2012
02/02/2026