Skill Set Summary
Over ** plus years of IT industry experience in Technical, Project Management and IT Vulnerability Management, Penetration testing, Splunk Management, CyberArk Implementation and Operations
Attended CyberArk Impact 2016 Security Conference and Training in Boston
Attended Qualys Security Conference (QSC) 2015 in Las Vegas
CyberArk upgradation from 8.X to 9.X version
10 plus years of experience in IT security, for BFSI, Retail and Manufacturing industries,
Performed PCI/DSS gap analysis, worked closely with QSA and ASV and successfully attained the PCI Level #1 service provider and level #2 merchant certification.
Implemented Vulnerability assessment tool (QulaysGuard)
Implemented Splunk for Log monitoring for the critical Data sources
Implemented CyberArk for Privilege account management
Experiences in centralized log management, alerting and reporting using RSA envision.
Vulnerability Assessment scan using Rapid 7 Nexpose
Antivirus, Anti Malware protection using McAfee ePolicy Orchestrator Security.
Web application security assessment using IBM Rational AppScan
Penetration test using Metasploit (Rapid 7)
Good Experience in IT Audit, Security, Implementation,Strategy,Delivery and Project Management
Extensive experience in SCCM 2007 and SCOM
Leading and managing geographically-dispersed teams.
Goal oriented and highly productive as a team member, mentor or team leader
Good knowledge in ITIL, ISO and SOX standards
Worked as CyberArk Consultant in NY, USA May’14– Till date
Complete CyberArk Infrastructure Setup i.e. Installation, Configuration and Management of components including but not limited to the following
CyberArk EPV in HA Mode with MS Clustering
Multiple CPM's in multiple Geographic locations
Load balanced PVWA in multiple Geographic locations
PSM farms in multiple Geographic locations
Integrated with Active Directory (LDAP), 2 Factor Authentication (RADIUS), Exchange (SMTP) & Splunk (SIEM)
PACLI – PrivateArk command line interface
Configured Platforms, Master Policies, Created Safes & On-Boarded 1000's of Privileged Accounts, connection components, transparent components, access control through AD Group Nesting’s
Safe management
Configured and managed DNA and Auto detection
Configured CyberArk AIM
On boarded bulk accounts using password upload utility
Configured the Vault backup
Installed, configured disaster recovery Vaults and DR services
Upgraded CyberArk 8.X to 9.X
Worked as Senior IT Security Analyst in CT, USA Jan’12– April 14
IT Security Analyst for a large S&P 500 company. I’m responsible for managing, monitoring and implementing the requirements for PCI-DSS, Cyber Trust & SOX (404) compliance. Work closely with various IT operation teams to ensure compliance, liaison between the customer/business and external auditor/QSA. Managing CyberArk, My additional responsibilities:
Respond to vendor security questionnaires and review contracts and RFPs.
Investigate and respond to security incidents.
Review Firewall & load balancer change requests
Manage and administer RSA envision for centralized log management of critical IT systems. Successfully integrated PCI in-scope Wintel and UNIX application servers and key network appliances like the Firewalls and VPN systems.
Vulnerability assessments and web application security scanning using Nexpose and IBM Rational AppScan respectively.
Installation and configuration of the EPV components (Central Policy Manager, Password Vault Web Access,, High Availability Vault Cluster, Secure Zone Access, SAN storage, SSL certificates and Load Balancing.
Performed in the role of subject matter expert in the creation of use cases, project time-lines and infrastructure diagrams; Created acceptance testing plans for vault admin and user functions.
Implemented secure storage and retrieval of shared passwords, one-time passwords, exclusive, Tested and implemented administrator/root passwords from a variety of platforms such as Windows, UNIX.
Send out security newsletters and latest industry trends to the user community.
Present Compliance status and IT security metrics from various systems to the Director of IT Security.
Put together standards and hardening procedure document for various platforms.
Weekly meeting with Directors to update the IT audit closure status
Wipro Technology, Bangalore India
IT Auditor, Wipro Technology Feb 2010 to 2011 December
Planned and executed risk based audits; performed surveys of functions and activities, determined risks for Activities in scope and prepared engagement work program
Performed engagement in a professional manner and in accordance with approved work program.
Conducted audit pre meeting with the team make them understand about the audit scopes
Prepared presentations to management during and at the close of the audit; discussed observations and recommended corrective action to improve operations and reduce cost.
Prepared draft audit report, expressing opinion on the adequacy and effectiveness of the system and the efficiency with which activities were carried out.
Performed business and process controls assessments, security, networks, operating systems, databases, Change management, Incident Management, Problem Management, Service Desk, interface, and application development controls assessments.
Performed System Development Life Cycle (SDLC), disaster recovery & business continuity plans and IT general controls reviews.
Performed application controls evaluation on several in scope applications, for example (SAP, Oracle ERP and Hyperion) and other legacy systems.
Performed projects review.
Performed Independent validations of SOX key controls to ensure compliance with Sarbanes - Oxley Act
IT Operations Manager, Wipro Technologies
March 2008 to 2010 February
Description: Manage IT services across Wipro offices with the SLAs, Tools and Processes. Lead the overall evaluation, design, implementation, sizing and upgrades of IT resources. Manage software and hardware assets.
Responsibilities:
Allocate the assets to end users within the defined timelines.
Update all the assets in the Asset Tracking Tool
Update the configuration changes are in the same assets tracking portal.
Cross verify all the assets through BAR code scanning once in a quarter
Prepare weekly and monthly reports on the asset allocation and release.
Conduct Internal and external audit to validate CMDB
Coordinate with various vendors in case of any hardware spares, broken replacement, faulty spare, by the way of having a strong SLA signed between vendor and corporate
SLA mapping between customer and vendor has been taken care by having 24/7 man power support for critical devices and few critical spares in all the regions
Proper NDA has been signed with all vendors to tighten the vendor management process and data security.
Negotiation with vendors, for purchasing desktop, laptop, printers, scanners and spares. Rate cards would be obtained from all the vendor for consumables and approval will be taken from CPO team the same will be uploaded in SAP to avoid any rate variance
Any material movement between location and region will be carried by authorized courier with whom proper SLA has been signed.
Validate software license based on the SCCM software inventory
If the users don’t have license, then they will need to uninstall the software on priority with screen shot
IT – Manager, Wipro Technologies,
Sep 2006 to March 2008
Description: Manage and maintain the infrastructure for about 10000 plus users in Wipro’s three major locations. Maintenance includes the availability of the WAN and LAN resources in a multi-domain environment, providing Server, Network, PC/Workstation administration support, resolving technical issues, and maintaining the company policies and processes based on the standards like ITIL, ISO and SOX. Managed a team of 22 members.
Responsibilities:
Conduct project meetings to gather requirements, to discuss project status, to review project deliverables for accuracy and apprise management of issues affecting project status, and to offer solutions to solve the issues
Develop, maintain, and distribute as appropriate standard program/project management deliverables such as Project Plan, Implementation plans, project issue tracker, meeting minutes, action items, project status report etc
Coordinate with cross functional teams to ensure accurate and timely completion of all activities assigned to members of the project team
Technical Lead, GE Energy
April 2005 – August 2006
Description: Managed the team across India GE Energy locations. Technology support group was responsible for maintaining the data center and managing servers and clients, troubleshooting network printers coordinate vendors for all hardware related issues, assigning user permissions, and maintaining the GEE Applications.
Responsibilities:
Managed Technical team across India GE Energy locations
Conduct meetings to discuss on pending calls, SLA, improvement areas, etc
Circulated MOM and the action item would be closed at the earliest
Monthly review meeting would be conducted to understand overall service delivery, if there was any deviation in the SLA action plan would be set to improve the location performance
Tech Support Engineer, Al-Rajhi Bank, Saudi Arabia Mar 04 to Mar 05
Provided an end to end support for Network, Server, Desktop, Banking Software, ATM etc. I used CA Unicenter for creating, updating and tracking the issues based on the severity.
Desktop Engineer Aski Computer, Chennai
June 2002 to Feb 04
Was responsible for assembling new machine, trouble-shooting OS, hardware and software issues and for configuring local and network printers
Academic Qualifications & Certifications
Master of Science in Information Technology
Prince2 Foundation
MCTS/MCTS/MCSA on Windows 2008
Member in ISACA
ITILV3
QualysGuard Vulnerability Management
ISO/IEC (27001:2013)
Certified Ethical Hacker(CEH)
CyberArk Certified Delivery Engineer(CCDE)
CyberArk Certified Sales Professional(CCSP)
Splunk Certified Power User
Pursuing CISA Exam