A highly skilled Cyber Security Lead with over 15 years of experience in designing and implementing enterprise-grade cybersecurity solutions, bolstered by a Master's degree in Cyber Security. Adept at driving organizational resilience through the development and execution of Business Continuity Plans (BCP), Disaster Recovery Plans (DRP), and compliance with global standards such as GDPR and ISO 27001.
Equipped with certifications including CISSP, CISM, CEH, CCNA, ITIL, and expertise as an Azure Solution Architect, I bring a well-rounded technical and strategic skill set to secure hybrid and cloud environments. Leveraging frameworks like Mitre ATT&CK and ITIL best practices, I specialize in building robust defense mechanisms and aligning cybersecurity initiatives with business goals.
Key highlights include:
Strategic Leadership: Overseeing cross-functional teams to design and implement scalable, secure, and compliant IT infrastructures.
Risk Management & Compliance: Driving adherence to regulatory standards and embedding governance frameworks to mitigate risks effectively.
Technical Proficiency: Expertise in IAM, vulnerability management, threat intelligence, and integrating advanced security tools across enterprise systems.
Cloud Security Expertise: Designing secure Azure architectures, implementing multi-layered defenses, and optimizing cloud security postures.
Incident Response & Resilience: Leading proactive incident management, threat detection, and remediation strategies to protect critical assets and ensure operational continuity.
With a commitment to fostering a culture of cybersecurity, I provide organizations with innovative solutions to combat emerging threats, ensuring data integrity, regulatory compliance, and business continuity.
Cybersecurity Strategy and Azure Cost
Optimization: Directed a large-scale Azure
infrastructure optimization project,
achieving over 40% cost reduction while
elevating security posture and operational
efficiency.
• Application Security Enhancement:
Architected Web Application Firewall
(WAF) with OWASP policies and
IP/geolocation-based rules, strengthening
the security of critical applications and
mitigating attack vectors.
• Firewall and VPN Security Management:
Oversaw firewall administration,
implementing least-privilege access
policies and enforcing multi-factor
authentication (MFA) for SSL VPN.
Developed robust processes for secure IPSec tunnel setup, enhancing cross-network
security.
SSL and Digital Certificate Administration:
Led secure digital communication
initiatives through SSL certificate lifecycle
management, ensuring encryption
standards across digital channels.
• Vulnerability Management and
Remediation: Executed monthly
vulnerability scans using Qualys and
Acunetix, systematically reducing
vulnerabilities to zero within two years and
bolstering the cybersecurity resilience of
key applications.
• Cybersecurity Testing and Exercises:
Supported annual Vulnerability Assessment
& Penetration Testing (VAPT), Red Team
exercises, and bug bounty programs to
identify security gaps and proactively
implement protective measures.
• Audit and Compliance Management:
Conducted comprehensive audits of
service principles, account expiration, and
password policies, maintaining regulatory
compliance and robust security hygiene
across the enterprise.
• Identity and Access Management (IAM):
Spearheaded CyberArk integration and
enforced IAM protocols, reducing attack
surfaces by bringing 90% of applications
under Single Sign-On (SSO) with MFA
requirements.
• Defense-in-Depth Implementation: Applied
multi-layered defense strategies across
Office 365, cloud applications, and
endpoints, reducing attack exposure
across platforms.
• Network Security and Segmentation: Led
network segmentation through VLAN and
subnetting implementations, strengthening
network access control and enhancing
internal security.
• Network Access Control (NAC) with AAA
RADIUS: Deployed RADIUS for NAC,
including secure wireless authentication, ensuring rigorous access control across
network endpoints.
• Conditional Access Policies: Developed
and enforced conditional access policies
to establish comprehensive control over
access management and endpoint
security.
• Cloud Local Administrator Password
Solution (LAPS): Implemented Cloud LAPS,
ensuring secure and compliant local
account management practices.
• Database Vulnerability Management:
Utilized Scuba Database Vulnerability
Scanner to identify and mitigate database
vulnerabilities, safeguarding critical data
assets.
• Cyber Threat Intelligence and Monitoring:
Leveraged Intrinsec for proactive threat
intelligence, encompassing data leak
detection, asset monitoring, brand
protection, and risk anticipation.
• ISO 27001 Certification and ISMS
Development: Achieved ISO 27001
certification through the development of
an Information Security Management
System (ISMS), establishing a formal
cybersecurity framework for the
organization.
• Policy and Incident Response
Development: Developed policies, incident
response processes, and reporting
mechanisms, optimizing operational
efficiency and ensuring effective incident
handling.
• Security Operations Center (SOC)
Management: Collaborated with Microsoft
XDR to fortify SOC functions, reducing false
positives and refining detection algorithms
to strengthen threat response
Managerial skills
undefinedCISSP
Archery
Reading Books,Yoga,Cooking, Watching Netflix
Yoga
Archery
Travelling
Reading
ISO27001:2022 LI
GDPR- Data Protection Officer
CISM
CISSP
ITIL
Microsoft Certified, Azure Fundamentals - Microsoft Corporation.
CEH-V9
CCNA