overview
- Evaluate cloud, DevOps security and data security risks throughout the enterprise and operationalize and automate security architecture processes
- Perform cloud threat modeling using Irius Risk and security posture management using Palo Alto Prisma
- Adaptive Shield, CASB, Snyk, twistlock, illumio, Crowd Strike and Sentinel
- Provide guidance to IT teams to securely architect solutions such as WAF/RASP, MFA, Hash/Salt (scrypt
- API/Cloud security, automated prevention of misconfiguration and protection/ isolation of critical data
- Review and ensure critical financial systems have the required levels of security, including tokenization
- Dedicated security architect for salesforce and digital banking platforms and for Layer6- AI/LLM startup
- IT Trailblazers, Randstad May 2017 to May 202 2
- Principal Architect/Cyber Security Consultant
- Project- API, Cloud & AI Safety
- Bank of New York Mellon
- Create framework and blueprint for Next Generation Cyber Security Governance in the following areas
- Blockchain (Corda, HyperLedger, payment transfer systems), APIs and Cloud (Azure, AWS, GCP
- Evaluate Cloud, DevOps security (twistlock) risks across Iaas/PaaS/SaaS solutions and mapped policy
- Implemented vendor risk assessment and application/systems security review process, including endpoint
- Evaluate the bank's cybersecurity program using maturity models such as FFIEC, NIST, ISO 27000, CIS and document gaps. Championed the bank's information protection and privacy of sensitive data
- Performed a deep-dive analysis for worst-case scenarios and evaluated appropriate controls using
- Evaluate the bank's cybersecurity program using maturity models such as FFIEC, and document gaps
- Incorporate web threat prevention (PING/Duo/SkyHighImperva/Skyfence) and cloud data security and cost control products as part of $100M+ Azure/Office365 roll-out (Redlock, Cloudyn
- Project: Cloud Security Architecture at Marriott International
- Major Credit Card /PCI environment: Optimized cross-team collaboration through standardized workflow
- Evaluated cost-effective and cutting-edge technologies to streamline operations, improve efficiency, and the use of strong cryptography to secure customer data at rest and in transit
- Investigated data breach issues, and adapt solutions related to lateral movement, credential theft and Active Directory/Azure Security
- Deployed CASB, Crowdstrike, and LastLine
- Migrated QRadar to Splunk, Cyphort, and Anomali
- Performed comprehensive security audit of entire product infrastructure for SOC1/2 certifications
- Aligned Security process according to NIST 800-53 standards
- Standardized security escalations for security issues, implemented user behavior detection tool, Akamai
- DDoS/early threat detection, and developed strategy for prompt restoration from ransomware, social
- Developed a risk-based vulnerability management system using CVSS v3
- Created a data-centric security control framework with automated workflow for remediation
- Re-engineered processes, including Security Policy revamp, asset and identity management, insider and external threat identification & remediation
- Review external threat vectors and optimize solutions such as Tanium, Splunk, Safebreach, Phantom
- Illusive Networks, Securonix, Carbon Black to incorporate cloud specific security concerns
- Wherever possible, use cloud-native and open source tools to optimize and integrate existing solution
- Optimized cross-team collaboration through standard workflow