1. Independent Consultant & Trainer August 2016 – Present
·Accomplished Cyber Security and Network Trainer, delivering 600+ technical hands-on training sessions to diverse clients and institutions globally, empowering over 100,000 participants.
·Proficient in conducting extensive security assessments, utilizing advanced tools such as Nmap, Nessus, Accunetix, Burp Suite, Metasploit, and more. Expertise includes web application and source code review, network configuration analysis, and offering strategic remediation plans.
·Consistently performing regular security analysis of client networks and IT infrastructure, providing valuable advisory on enhancing overall security posture.
·Demonstrated proficiency in patch management and proactive monitoring of backup activities through efficient patch management practices.
·Well-versed in vulnerability management life-cycle, from identification and assessment to reporting and resolution.
·Experienced in reviewing network configurations to ensure optimal performance and swift incident response.
·Notable achievements include designing high-quality Cyber Security e-learning programs for prominent companies, including a Big4 organization, and creating comprehensive CCNA and CCNP e-learning content for multiple clients.
2. Cyber Security Consultant Price waterHouse Coopers (PwC)
June 2015 – August 2016, Gurgaon India
Projects :
Network Security Audit ( Govt. Client)
Compliance readiness, Audit preparation & Third-party audits in partnership with other security teams in the organization
Firewall Audit
Information Security Policy Gap Assessment according to ISO 27001:2013 Defined Network Processes for the organization
Perform security assessments such as VA/PT, Web Application, Source Code Review & configuration
Developed & Implement MBSS (Minimum Baseline Security Standard) for Core/IT infrastructures
Security Assesment of SDWAN including of ACI and APIC
A. OS Configuration Review (US Client)
Operating system and network configuration review according industry practice.
B. Cyber Security Assessment of Scada/ ICS system of a leading government client
Network Architecture Review of SCADA and IT network
Vulnerability analysis and security design of SCADA/ICS Control systems Configuration Review of SCADA networkFirewalls
Security Solutions and Policy Review of IT and SCADA System as per NIST 800-82 Web Application security assessment of applications used by IT and SCADA users Penetration testing of critical infrastructure of SCADA and IT network
Assessment of Historian Services and Yokogawa system.
A. BCP/DR
Worked on Business Impact Analysis Recovery strategies
B. Engineer
Infotel Group Solutions Limited
February 2014 – June 2015 (1 Year 5 Months) Gurgaon, India
Responsibilities:
Configuration and Management of Network components. (Routers, Switches and firewalls)
Provide Second level technical support ( Active Directory , Windows related issues ) Responsible for designing and implementation of customer’s network infrastructure Delegated projects to other team members and ensure their successful completion. Installation , configuration and management of Cisco API and APIC Server.
Evaluate, hire and train Network professionals.
Configuration and Management of Servers. (MS 2003, 2008 R2, 2012R2, Red hat) Conduct security audits and manage remediation plans.
Perform VA on Network Infra.
Create, manage and maintain user security awareness.
Monitor and advice on information security issues related to the systems and
workflow to ensure the internal security controls for the campus are appropriate and operating as intended.
Conduct Training Sessions for internal Employees.
Develop and publish Information Security policies, procedures, standards and guidelines based on knowledge of best practices and compliance requirements.
5.Senior Network Engineer & Certified Ethical Hacker Network Bulls
July 2013 – February 2014
Responsibilities:
Coordinate and execute IT security projects for the Companies & university.
Provided Training to Faculty & Students of various universities on Computer Networks,
Network Security, Ethical Hacking and LinuxCoordinate response to information security incidents Actively participate in the higher education security community etc.