Sonali Joshi CISSP, CISM

Sonali joshi cissp, cism

bookmark on deepenrich
location of Sonali Joshi CISSP, CISMSacramento, California, United States
Followers of Sonali Joshi CISSP, CISM221 followers
  • Timeline

  • About me

    Cyber Security Engineer| Vulnerability ,threat and risk management| Data Analytics| Data Science at Intel Corporation

  • Education

    • California state university-sacramento

      2003 - 2005
      M.s computer science
  • Experience

    • Social interest solutions

      Jun 2006 - Oct 2010
      Solutions lead
    • Trinity technology group, inc.

      Oct 2010 - Dec 2013
      Senior analyst
    • Esurance

      Jan 2014 - Jan 2016
      Senior system analyst
    • Intel corporation

      Jan 2016 - now
      Security engineer

      •Perform information system security vulnerability scanning to discover and analyze vulnerabilities and characterize risks to networks, operating systems, applications, databases, and other information system component.•Responsible for the reviewing vulnerabilities' data from multiple sources (i.e. external / internal penetration testing, internal / external vulnerability scanning, etc.) across multiple technologies and a changing environment including infrastructure and applications to determine risk rating of vulnerabilities to business assets•Improving and automating existing vulnerability management lifecycle. Including but not limited, data ingestion & normalization, compliance metrics.•working with the Business to effectively communicate the risks of identified vulnerabilities and make recommendations regarding the selection of cost-effective security controls to mitigate identified risks•Ensuring scan results are presented in appropriate dashboards, reports.•Work with end users, with support and resolution for scanning and vulnerability remediation reporting issues.•Work and communicate with Patch management teams to ensure necessary patches are deployed across enterprise.•Experienced with managing and performing root cause analysis, risk identification, and risk mitigation.•Interpersonal skills including the ability to; collaborate effectively, provide updates to key management members, manage challenging relationships, assist and mentor team members developmentally and display excellent written and oral communications.•Measures effectiveness of defense-in-depth architecture against known vulnerabilities.•Working with third party API’s to integrate data from various tools into data lake•Strong analytical skills with the ability to collect, organize, analyze, and disseminate significant amounts of information with attention to detail and accuracy•Ensure quality assurance and define Key Performance Indicators (KPIs) Show less

  • Licenses & Certifications

    • Giac enterprise vulnerability assessor

      Sans institute
      Jul 2022
    • Certified information security manager (cism)

      Isaca
      Jun 2020
    • Safe 4 practitioner certification

      Scaled agile, inc.
      Jun 2019
    • Certified scrum master(csm)

      Scrum alliance
    • Splunk core certified advanced power user

      Splunk
      Dec 2019
    • (isc)2 security cissp (isc2-cissp)

      (isc)²
      Jun 2023