8+ years of experience as an IT Information Security analyst. Compatible team player through complete project cycles, testing and final implementation.
CISSP (Certified information systems security professional (ISC2)), CISA (Certified information systems auditor (ISACA)), CISM (Certified Information Security Manager (ISACA)) Certified ethical hacker (CEH v9), EC council certified security Analyst (E|CSA v10), CheckPoint certified security expert (CCSE R77.30),
Professional Membership – Cryptology Research society of India (CRSI – Life Member), Data Security coun[1]cil of India (Bangalore Chapter – Member), ISC2 Bangalore Chapter (Member)
Instructor Summary
Professional with experience in Information Technology in the fields of ITGRC, SOX Compliance, SSAE16.
Expertise in IT SOX compliance, Proficiency in General IT Controls, Business Continuity management, applications controls and performing SOC1 and SOC2 Reviews.
Risk based Internal Audits – Managed and conducted risk based internal audits to comply with ISO27001 [ISMS], NIST and COBIT standards.
Mergers and Acquisitions – Carried out Due Diligence Audits prior to Mergers and/or Acquisitions to assess technical and financial risks.
IT strategy consulting services – Carried out IT strategy reviews and assisted in implementation of a value governance framework.
Conducted application security assessments, business cycle controls (BCCs) review, general computer controls (GCCs), Segregation of duties analysis.
Participated in Security policy and procedure development in alignment with business needs
Service Delivery – Participated in engagement planning, management, client report review and delivering client presentations.
Knowledge Management- Developed work programs and methodologies to build specific competency and enhance value proposition.
Team Building – Key contributor towards knowledge sharing, training, motivating and development of team members.
Performed IT-GCC testing for multiple applications, Database Security Audits, SDLC & SQL Reviews, Process Automation, IT Asset Management, Software License Reviews, Operating Systems Security Audits for UNIX (Solaris, Linux, HP-UX, AIX), Windows
Disclaimer: Some of the graphics on our website are from public domains and are freely available. This website may include copyright content, use of which may not have been explicitly authorized by the copyright owner. The names, trademarks, and brands of all products are the property of their respective owners. The certification names are trademarks of the companies that own them. This website's company, product, and service names are solely for identification reasons. We don't own them, don't hold the copyright to them, and haven't sought any kind of permission. The use of these names, logos, and trademarks does not indicate that they are endorsed. Please contact us for additional details.
This website uses cookies: Our website utilizes cookies to gather information such as your IP address and browsing history, such as the websites you've visited and the amount of time you've spent on each page, and to remember your settings and preferences. Other cookies enable us to track Website traffic and users' interactions with the site; we use this information to analyze visitor behavior and improve the site's overall experience.