Name : Sravan Kumar Kurrapati
Email: ***************@*****.*** Ph no: +1-469-***-****
LinkedIn Portfolio
PROFESSIONAL SUMMARY
•Over 4 years of experience in IT audit, cybersecurity, and vendor risk management, with a strong focus on ensuring compliance with regulatory frameworks such as ISO 27001, NIST 800-53, OCC, FDIC, CFPB, and FFIEC.
•Conducted IT General Controls (ITGC) reviews, identifying security gaps, evaluating controls, and enhancing audit processes using tools like ACL, IDEA, and TeamMate.
•Proficient in performing vendor risk assessments, including onsite evaluations, SIG questionnaire analysis, and risk documentation to mitigate third-party security risks.
•Expertise in GRC tools such as RSA Archer, MetricStream, and ServiceNow GRC to streamline compliance workflows, manage security controls, and report risk metrics.
•Developed and implemented cybersecurity policies and procedures, ensuring alignment with regulatory and organizational standards.
•Conducted audits and reviews of cybersecurity programs using NIST 800-53, CIS CSF, and ISO 27001 frameworks to ensure robust risk management.
•Skilled in security incident analysis and threat mitigation, utilizing Wireshark, Splunk, IBM QRadar, and Bro/Zeek to identify and address potential threats.
•Experience in cybersecurity monitoring, investigating alerts from SIEM tools like Splunk, QRadar, and ArcSight to ensure timely threat response.
•Collaborated with internal and external teams on security issues, providing detailed reports and implementing necessary security controls for regulatory compliance.
•Expertise in cloud security for AWS and Azure, including risk assessments, security policy creation, and deployment of cloud security controls.
•Proficient in data loss prevention (DLP) technologies, managing tools like Symantec, Websense, and McAfee to safeguard sensitive information.
•Hands-on experience with firewall management, including F5 LTM/GTM, Checkpoint, and Palo Alto, ensuring network security compliance.
•Designed and implemented security frameworks for application security using best practices, secure coding, and penetration testing methodologies.
•Applied deep knowledge of malware analysis through static and dynamic techniques, developing actionable threat intelligence and mitigation strategies.
•Strong understanding of compliance auditing for federal regulations and standards, ensuring businesses adhere to cybersecurity and privacy policies.
•Conducted SOC incident monitoring and investigations, providing detailed analysis of security events and escalations to ensure system integrity.
•Proven ability to assess third-party risk, recommend security measures, and ensure vendors comply with organizational security standards.
•Implemented security protocols to enhance data confidentiality and integrity across hybrid and cloud infrastructures.
•Proficient in vulnerability management, including Nessus and Wireshark, to identify and remediate critical security flaws.
•Adept at fostering collaboration with cross-functional teams to ensure security strategies align with business goals and regulatory requirements.
TECHNICAL SKILLS
Cybersecurity Frameworks
NIST 800-53, ISO 27001, CIS CSF, FFIEC, OCC, FDIC, CFPB
GRC Tools
RSA Archer, MetricStream, ServiceNow GRC
Audit Tools
ACL, IDEA, TeamMate
SIEM Tools
Splunk, IBM QRadar, HP ArcSight, Netforensics
Security Incident & Event Management
DLP (Symantec, Websense, McAfee), IDS/IPS (Snort, Bro/Zeek, Sourcefire)
Network Security
Cisco Routers, Switches, F5 LTM/GTM, Palo Alto, Checkpoint
Programming Languages
Python, Java, PowerShell, HTML
Operating Systems
Windows, Linux (Ubuntu, Red Hat), macOS
Cloud Technologies
Amazon Web Services (AWS), Microsoft Azure, AWS Lambda, Elastic Beanstalk, Identity Access Management (IAM)
Firewalls & VPNs
Checkpoint, Palo Alto, Fortinet, F5, VPN, Web Proxy
Vulnerability Management
Nessus, Wireshark, TCPDump, Bro/Zeek
Malware Analysis
Static & Dynamic analysis tools, SIEM, Splunk, IBM QRadar
Data Analytics
Power BI, Excel, Numpy, Pandas, Natural Language Processing (NLP), Regular Expressions (Regex)
Database Management
MS SQL, MySQL
Virtualization & Containerization
Amazon EC2, Docker, Kubernetes
Compliance
ISO 27001, NIST 800-53, PCI-DSS, GDPR
CERTIFICATION
•CompTIA cysa+
•Google cyber security analyst
•AWS Certified Solutions Architect - Associate
•Splunk Enterprise Security Admin (Expected - Nov/2024)
PROFESSIONAL WORK EXPERIENCE
Client: Capital One Aug 2023 – Present
Role: Cybersecurity Risk Analyst
Responsibilities:
•Performed detailed vendor risk assessments, including on-site evaluations and documentation reviews, ensuring compliance with internal security protocols and regulatory requirements (OCC, FDIC, FFIEC, ISO 27001).
•Developed and maintained comprehensive audit documentation, ensuring alignment with state and federal regulations to facilitate smooth audits and regulatory reviews.
•Spearheaded the implementation of enterprise-wide security policies, improving adherence to ISO 27001 and other industry frameworks.
•Managed vendor documentation assessments using RSA Archer, MetricStream, and ServiceNow GRC, identifying potential risks and suggesting mitigation strategies.
•Conducted in-depth IT General Controls testing using ACL, IDEA, and TeamMate, ensuring system integrity and the effectiveness of control mechanisms.
•Collaborated with legal and compliance teams to align cybersecurity practices with regulatory requirements, mitigating audit risks.
•Utilized GRC tools to streamline compliance processes and maintain accurate records of security assessments, leading to a 15% improvement in audit readiness.
•Designed and executed security frameworks based on industry standards such as ISO 27001 and SIG, enhancing the organization's overall cybersecurity posture.
•Led vendor compliance evaluations by using standardized information gathering questionnaires and assessing inherent risks, providing critical recommendations for risk mitigation.
•Identified potential security threats and implemented tactical mitigations using Splunk and IBM QRadar, significantly reducing incident response times.
•Applied advanced threat intelligence to detect and analyze Indicators of Compromise (IOCs) using Wireshark, Snort, and Bro/Zeek to enhance incident response capabilities.
•Collaborated with cross-functional teams to ensure alignment between security controls and enterprise-wide business objectives.
•Developed incident response strategies in collaboration with managed service providers, ensuring swift resolutions of security issues.
•Conducted cloud security assessments for new cloud applications deployed in Azure, ensuring compliance with security best practices.
•Monitored vendor risk management metrics and ensured alignment with evolving industry standards and security requirements.
•Established performance metrics and KPIs to assess the effectiveness of the organization's security protocols and ensure continuous improvements.
•Utilized tools like RSA Archer and MetricStream to monitor risk metrics and report findings to senior leadership.
•Conducted ongoing security reviews to ensure that vendor practices complied with organizational standards and regulatory requirements.
•Created detailed reports of security risks, incidents, and mitigation strategies, presenting them to leadership for decision-making.
•Engaged in proactive risk monitoring using automated solutions, ensuring real-time detection and mitigation of security risks.
Environment: RSA Archer, MetricStream, ServiceNow GRC, Splunk, IBM QRadar, ACL, IDEA, TeamMate, Wireshark, Snort, Bro/Zeek, Python, Azure, ISO 27001.
Client: Tata Consultancy Services Apple Nov 2020 – Jun 2022
Role: Cybersecurity Analyst Trust & Safety Anti-abuse
Responsibilities:
•Led efforts to ensure application compliance with internal safety and trust policies, performing detailed risk assessments and delivering comprehensive security recommendations.
•Collaborated with the app review teams to ensure that content, data, and user interactions complied with Application store policies and legal requirements.
•Developed and implemented automated solutions to identify spamming and phishing content using advanced algorithms and Python scripts, reducing malicious activity by 20%.
•Conducted regular risk assessments, identifying critical security gaps in applications and recommending mitigation measures to protect user data and ensure platform security.
•Analyzed malware through static and dynamic analysis, utilizing tools like Splunk and Wireshark, resulting in improved incident response.
•Actively monitored application activity to detect indicators of compromise, applying incident response procedures using tools like Sourcefire, SNORT, and Splunk.
•Engaged in vulnerability management, performing regular assessments using Nessus scanner and developing action plans to address identified risks.
•Ensured compliance with various industry standards such as NIST 800-53, ISO 27001, and CIS CSF through detailed audits and assessments.
•Led the development of anti-abuse strategies, providing real-time analysis of phishing, spam, and malware threats using natural language processing (NLP) and regular expressions (Regex).
•Collaborated with cross-functional teams to implement security controls and improve the app review process, enhancing the overall security of Application stores.
•Utilized ServiceNow and Jira to manage incident response workflows, ensuring timely and effective mitigation of security threats.
•Conducted internal cybersecurity audits, identifying and addressing security vulnerabilities in third-party risk management processes.
•Mentored junior analysts in identifying security risks and developing effective mitigation strategies, fostering a culture of security awareness.
•Created comprehensive documentation for security incidents, including root cause analysis and mitigation strategies, ensuring continuous improvement.
•Worked with managed service providers to align security controls with business objectives, improving third-party risk management processes.
•Leveraged SIEM tools like Splunk to monitor for potential security events, contributing to improved incident detection and response times.
•Designed security monitoring dashboards in Splunk, providing real-time visibility into application performance and security metrics.
•Utilized threat intelligence to improve detection mechanisms for phishing, spam, and malicious content across the platform.
•Developed custom security rules in Splunk to detect and alert on abnormal behavior in application stores.
•Implemented DLP and other security measures to safeguard user data and ensure compliance with global privacy standards.
•Contributed to the design of incident response playbooks, improving the team's efficiency in handling security incidents.
•Conducted penetration testing on applications using tools like Kali Linux and Metasploit Pro, uncovering vulnerabilities and proposing remediation.
•Monitored and responded to SOC incidents in collaboration with cross-functional teams, ensuring swift resolution of security events.
•Led efforts to improve the organization's application security posture by identifying and remediating common security flaws in the code.
•Worked closely with developers to enhance application security by integrating security best practices into the SDLC process.
Environment: Python, Splunk, Sourcefire, SNORT, Nessus, ServiceNow, Jira, Metasploit Pro, Kali Linux, Azure, ISO 27001, NIST 800-53, CIS CSF, Regex, NLP.
Client: Dell Jun 2019 – Oct 2020
Role: Cybersecurity Analyst
Responsibilities:
•Led efforts to configure and monitor SIEM platforms (IBM QRadar, Splunk) to detect and respond to security threats across enterprise environments.
•Conducted vulnerability assessments and penetration tests, utilizing tools like Nessus and Wireshark to uncover potential security risks and strengthen defenses.
•Implemented cloud security controls in Azure environments, ensuring compliance with organizational policies and regulatory requirements.
•Deployed and managed firewall configurations for Palo Alto, Cisco, and Checkpoint firewalls, securing enterprise networks from external threats.
•Provided expertise in DLP, IDS/IPS, and malware analysis tools to protect sensitive information and enhance overall security posture.
•Monitored security alerts using SNORT and Sourcefire IDS, escalating critical incidents to ensure swift resolution.
•Designed and deployed security solutions for web traffic management, including Bluecoat ProxySG and SWG, reducing threat exposure.
•Responded to cybersecurity incidents, coordinating with cross-functional teams to ensure timely resolution and documentation of events.
•Built automated monitoring solutions using Splunk on AWS and Azure environments, improving real-time threat detection.
•Conducted system security audits, ensuring compliance with industry standards such as CIS and ISO 27001.
•Configured and maintained endpoint security solutions, including McAfee products, to safeguard corporate data and infrastructure.
•Participated in the design and implementation of F5 ASM and Imperva WAF to protect web applications from external threats.
•Performed penetration testing using Metasploit and Cobalt Strike, identifying vulnerabilities and providing actionable recommendations.
•Supported cloud security migration projects, working with development teams to move legacy applications to Azure securely.
•Led the implementation of encryption and data tagging controls in cloud environments, ensuring data protection and compliance with regulatory frameworks.
•Actively participated in incident response efforts, utilizing forensics tools to investigate and resolve security breaches.
•Conducted regular reviews of firewall logs and security reports to identify and address potential anomalies and threats.
•Managed security event triaging, leveraging SIEM tools to detect and escalate incidents as needed.
•Collaborated with the network and systems engineering teams to ensure security measures were integrated into the design and deployment of new applications.
•Provided security awareness training to employees, fostering a security-first mindset across the organization.
•Implemented security controls for cloud containers and virtual machines, enhancing the organization's ability to detect and respond to threats in dynamic environments.
•Worked closely with application developers to integrate security best practices into the software development lifecycle (SDLC).
•Performed regular security assessments of cloud infrastructure, ensuring alignment with security policies and best practices.
•Developed detailed incident response playbooks, streamlining the process for handling cybersecurity incidents.
•Led efforts to assess the security of third-party applications, working with vendors to address identified risks and improve overall security.
Environment: IBM QRadar, Splunk, Nessus, Wireshark, Kali Linux, Metasploit, Palo Alto, Cisco, Checkpoint, Bluecoat ProxySG, McAfee, AWS, Azure, ISO 27001, CIS.
EDUCATION
•Master of Science in Computer Science from Western Illinois University in Year 2024 May