Highly skilled and result-oriented Cyber Security professional with 13 years of expertise in implementing security measures and risk management strategies. Skilled in conducting risk assessments,Access reviews, User provisioning, Access controls, Privilege Management, developing and executing incident management procedures, and ensuring compliance with industry standards. Proficient at leveraging emerging technologies and staying updated with cybersecurity trends to mitigate evolving threats.
Effective communicator and collaborator, adept at working with cross-functional teams and stakeholders to gather requirements.
• Learned all required tasks quickly to maximize performance.
• Contributed to team success by completing jobs quickly and accurately.
• Maintained productive, efficient approach to all tasks.
• Assisted with inventory counts and stocking of merchandise.
• Ensured smooth operations during peak periods via effective time management techniques such as delegation and task prioritization.
• Maintained strict adherence to company policies and procedures while sustaining high-quality work standards under pressure.
• Monitored and verified merchandise for proper prices and labels.
• Collected, arranged, and input information into database system.
• Worked as a volunteer for NGO (Samridhi Society) which helps small business to Build/Move there business to Digital Platform.
• Guided Biza Collection to move there Inventory to Database from Book-keeping/Excel and help them to build there website for Online sales.
• Perform the assessment and implementation of Information Security Management System Frameworks, Including ISO 27001, NIST CSF achieving 100% compliance with regulatory requirements.
• Conducted cyber risk assessment, identifying a 70% reduction in high-risk vulnerabilities and implementing remediation strategies to bolster the organization's cyber posture.
• Evaluated controls across key domains such as asset management, identity and access management and third-party risk management (TPRM).
• Conducting Audits / Assessments wrt Contractual obligation.
• Monitor & track all internal audit findings and facilitate closure within 30-60 days.
• Performed risk assessments across industries, identifying and evaluating controls to mitigate potential threats in compliance with industry standards and regulatory requirements.
• Executed testing of IT application controls and IT general controls review, covering Access Management, Backup management, and Incident management, ensuring 90% adherence to established control protocols.
• Spearheaded risk assessment and control identification processes, documenting in Risk and Control Matrix and enhancing transparency and accountability in risk management procedures.
• Conducted security audits, ensured compliance with ISO 27001 and NIST Cybersecurity Framework, and provided actionable improvement recommendations.
• Coordinated to the development, implementation, and revision of security processes, SOPs, and policies in alignment with the ISO 27001 framework, ensuring compliance with ISO standards.
• Stayed abreast of emerging cybersecurity threats and trends, updating security controls and protocols to mitigate evolving risks and vulnerabilities.
• Evaluated controls across key domains such as asset management, identity and access management.
• Providing identity and access solutions which help safeguard valuable data and applications with context- based access control, security policy enforcement and business- driven identity governance.
• Conduct internal audits and technology risk assessment.
• Responsibilities include identifying the weaknesses in the systems and creating an action plan to prevent security breaches.
• Responsibilities include identifying the weaknesses in the systems and creating an action plan to prevent security breaches.
• Provide In-house application support for CAIDM & CA Governance Minder
• Support, maintenance, and implementation of complex project module
• Access control to the applications using the Cyberark Components
• Working with SOX/Compliance team to process reports related to User account and Role/Access related utilizing application like CA Identity Manager and CA Governance Minder
• Provide In-house support as part of Account Administration team for Application like Exchange 2013, Mainframe, Skype, RSA and Active Directory.
• Reporting issues to P1 and P2 as per the impact to Team Lead.
• Submitting reports for User access to application and Offboard the User Account.
• Manage technical process, management workflow to support user's queries and requests.
• Maintain/build relationships with other support groups that impact the technical aspect of our support.
ISO 27001:2022 ISMS LA
GDPR Lead Implementer
Professional Scrum Master I
Security Risk Assessment
TPRM
Information Security Management
Security Controls
Compliance Management
Risk Management
Security Awareness Training
Power BI
Incident Management
Business Continuity Planning
Disaster Recovery Planning
Information Technology Governance
Incident Response