About Me

Security Architect with over 15 years of experience, I specialize in designing and implementing robust security solutions that safeguard critical assets and ensure compliance with industry standards. My expertise spans across enterprise security architecture, risk management, and advanced threat mitigation, coupled with a deep understanding of the latest cybersecurity trends and technologies. I have a proven track record of enhancing security postures for diverse organizations, through strategic planning and innovative security frameworks. Passionate about fortifying digital landscapes, I am dedicated to delivering secure, scalable, and resilient systems.
My approach combines deep technical expertise with a strategic vision, ensuring products are protected against evolving threats from design to deployment. I excel in collaborating with development teams to embed security best practices throughout the product lifecycle, fostering a culture of security awareness, and continuously improving security protocols to maintain a competitive edge in the dynamic cybersecurity landscape.
Skills
TECHNICAL
PERSONAL
Resume
Technical Certifications
Business Certifications
- Business Foundation Specialization - Wharton Online | University of Pennsylvania
- Strategic Leadership & Management Specialization - Gies College of Business - University of Illinois Urbana-Champaign
- Business Model Innovation - HEC, PARIS
- Strategic Management – IIM, BANGALORE
- Innovation & Information Technology Management – IIM, BANGALORE
Education
PG DIPLOMA - INFORMATION SYSTEM & CYBER SECURITY
2010
Advanced Computing Training School - C-DAC, Pune, MH
Bachelor of Engineering - Computer Science and Engineering
2005 - 2009
Nagarjuna College of Engineering and Technology, Bengaluru, KA
Professional Experience
Novartis
Director - Security Solution Architect
Feb, 2020 - Present
Pharmaceutical
Healthcare
APPLIED MATERIALS
PRODUCT SECURITY ARCHITECT
Oct, 2019 - Feb, 2020
Product Development
Semiconductor
BNP PARIBAS
MANAGER – SECURITY & IT RISK
Apr, 2016 - Oct, 2019
Banking
Financial
Infinite Computer Solutions
SENIOR TECHNICAL CONSULTANT - SECURITY
Feb, 2016 - Mar, 2017
Product Engineering Services
IT Services
IDEMIA
SENIOR SECURITY ANALYST - CYBER DEFENSE
May, 2014 – Feb, 2016
Product Development
Biometrics
Smart Devices
Public Security
METLIFE
TEAM LEAD – CYBER SECURITY & THREAT MANAGEMENT
Apr, 2012 – May, 2014
Insurance
Healthcare
NESS
MEMBER OF TECHNICAL STAFF
Jul, 2010 - Apr, 2012
Consulting
Engineering Services
Indian Institute of technology, Kharagpur
RESEARCH ASSISTANT
Sep, 2009 - Feb, 2010
Research
Grid Computing
Work Details
- Define, deliver and maintain future-fit information security architecture principles, standards and technology roadmaps to support the secure design and implementation that address full stack security requirements.
- Identify and develop Global Security Architectural Standards, Design Patterns, Reference Architectures and Roadmaps used to define the security principles and constructs in which all products are designed to incorporate consistent and appropriate security controls.
- Monitor projects with high strategic impact to ensure processes are being followed and goals achieved, including completing milestones on time and within budget.
- Engage with architects, technical leads and R&D Engineering & Development teams to ensure the security considerations are inducted well in advance during the product development cycle.
- Work with solution architects to provide mitigation and potential remediation recommendations for solving unprecedented issues and problems.
- Maintain deep understanding of the information security landscape and emerging technologies and identify key implications and actions for security architecture to maintain a forward-thinking approach.
- Evaluate and select the technologies and tools required for the delivery of the cyber security target architecture for software, infrastructure in partnership with Enterprise Architecture.
- Deliver KPIs/metrics for security architecture for management reporting stakeholders. Produce necessary metrics to demonstrate overall completeness of defensive strategy.
- Collaboratively define and prioritize security backlog for products that continuously delivers measurable value towards the vision.
- Communicate with a broad range of senior stakeholders to exhibit business alignment.
- Coach and mentor architects with functional reporting.
- Contribute to organizational whitepapers and represent in industry consortium for practice standardization.
Key Deliverables: Architecture References Software as a Medical Device security Cloud based life science solutions Digital Health Platform Connected Medical Devices
- Ownership of product security program for the business function.
- Independently drive strategy, execution and technical direction for complex information security programs, including scope, deliverables, and communication strategy.
- Working with product architects to investigate secure design approaches, prototype design patterns and evaluate technical feasibility.
- Identify and coordinate the interdependencies among programs, products and other critical initiatives across all security sub-departments within the organization.
- Develop program milestones, key performance indicators, and success criteria in collaboration with subject matter experts.
- Represent Information Security in discussions regarding business strategy discussions, special projects, escalations, and senior leadership escalations.
- Define processes end-to-end and drive improvements for maximum impact for information security goals and objectives.
- Develop and implement creative security architectural approaches that utilize proper security controls to meet both ongoing and emerging threats.
- Work with Computer Security Incident Response Team (CSIRT) to manage & contain information security incidents and events to protect company IT assets, Intellectual Property, and company's reputation.
- Domain expertise in securing OT & digitalization systems and expert knowledge in Critical infrastructure significant cyber-security standards such as IEC 62443, NIST CSF, Manufacturing, SEMI.
Key Deliverables: Product Security Program OT Security Security Assurance PSIRT SEMI Consortium Security Champion
- Primarily responsible for strong partnership with the Application Development and operations team of the Global Businesses and Functions to ensure an effective application security.
- Responsible for Local leadership of the offshored Project & Digital Security.
- Global delivery of security initiatives ensuring harmonization across regions.
- Security liaison for DevSecOps project.
- Support internal and external audits for compliance and regulators.
- Steer and represent security committees for CSF & KRI reviews. Coordination with Committees for necessary direction and approvals, preparation and presentation of relevant agenda.
- Responsible for global security services delivery for the line of business including : SAST, DAST, IAST, RASP, SCA, PT and Risk Management.
- Delivering new security technology approaches and implementing next generation solutions. Conducting POC’s and support tool qualification with ROI analysis.
- Participate in IT security budget and communicating this with the appropriate parties.
- Tracking latest IT security innovations and keeping abreast of latest cyber security technologies.
- Development of RefCards to standardize security for technology stacks.
Key Deliverables: Application security Team management Vendor management Audits Risk management Automation
- Perform security-focused code reviews manually and automated.
- Support and consult with product and development teams in the area of application security, including threat modeling and appsec reviews.
- Assist teams in reproducing, triaging, and addressing application security vulnerabilities.
- Participate and assist in initiatives to holistically address multiple vulnerabilities found in a functional area.
- Drive highly complex application security reviews and threat modeling. Provide expert guidance and direction for other team members when they encounter challenges in their security reviews. Own documentation and procedures surrounding application security reviews as well as lead by example for what successful application security reviews look like.
- Drive initiatives which scale application security and holistically address multiple vulnerabilities.
- Drive the business value relation of metrics calculations for the Application Security program.
- Working closely with our development team to create an automated continuous integration (CI) and continuous delivery (CD) system.
- Mobile application assessment. Android and iOS apps.
- Working on ways to automate and improve development and release processes.
Key Deliverables: Secure Code Review Penetration Testing DevSecOps CI/CD Mobile Security Testing Threat Modelling
- Implementing and managing defined security KPI aligning to ISO 27001.
- Analyzing various security events and logs for infection or intrusion.
- Experience with McAfee ePO SIEM suite.
- Log Management using Loglogic.
- Network and Infrastructure security assessment.
- Server and Network management.
- Working on cipher/cryptographic implementation for High Security Module (HSM) for smart cards.
Key Deliverables: Infrastructure security ISO27001 Network Security Server Administration SOC Monitoring Cryptographic Modules
- Vulnerability Management through QualysGuard.
- Threat management using Symantec MSS.
- Experience with Sungard LDRPS & BCM.
- Developing and documenting Business Continuity Plan.
- Coordination for maintenance & update , exercise and review of policies & procedure.
- Disaster recovery planning & review.
- BIA & recommending recovery strategies and options.
Key Deliverables: Business Conitnuity Disaster Recovery Vulnerability Management Threat Management Security Process Business Impact Analysis
- Worked at Symantec with their enterprise security product critical system protection for policy design.
- Web application security aligned to OWASP and SANS.
- Worked closely with various clients for providing security assessment.
- Worked with Symantec host intrusion prevention system(HIPS).
- Worked on intrusion detection system.
- Experience with forensics tools (FTK & EnCase).
- Worked extensively with VMware ESX, RHEL, SLES, SOLARIS & Windows server.
Key Deliverables: IDS/IPS Forensics Security Assessment Firewall Server Management OWASP
Tools and Technologies
- Secure code review | SAST – Fortify, Coverity, Checkmarx, Veracode
- Dynamic application security testing | DAST – AppSpider, WebInspect, Qualys, Acunetix, VeraCode, BurpSuite, Postman
- IAST/RASP – Contrast
- Container Security – Aquasec, Clair
- Software Compostion - XRay, BlackDuck, Dependency Check
- Network scanner – Nessus, Nexpose, Nmap, Qualys, Wireshark, Metasploit
- Business Continuity Management – LDRPS
- Threat Management – Symantec MSS
- IDS/IPS - Symantec critical system protection, Snort
- GRC – Service now GRC, Archer
- Endpoint protection & Log management – McAfee ePO, Loglogic, Cortex, Sophos, ELK, Splunk
- DevOps – Bitbucket, Jenkins, docker, Artifactory
- Third Party assessment - Archer, SIG
- Scripting – Bash, PowerShell, Macros, Python
- Correlation & Visualization – ThreadFix, ELK, Tableau, MS PowerBI
- Compliance & Frameworks – NIST, ISO, PCI DSS, CIS, GDPR, HIPPA, SOX, OWASP, IEC, STIG
- Threat Modelling - MS TAM, IrusRisk
- Methodology - Agile, Scrum
- Firewall - Fortinet, Untangle