Jaspal Singh

Jaspal Singh

Lecturer In Computer Science

Followers of Jaspal Singh862 followers
location of Jaspal SinghChandigarh, India

Connect with Jaspal Singh to Send Message

Connect

Connect with Jaspal Singh to Send Message

Connect
  • Timeline

  • About me

    Director - IT Security at Fidelity Information Services

  • Education

    • Punjab Technical University

      1997 - 2001
      Bachelor of Technology (B.Tech.) Electrical, Electronics and Communications Engineering
  • Experience

    • SDP College for Women, Ludhiana

      Aug 2001 - Dec 2002
      Lecturer In Computer Science
    • VCustomer Services Pvt. Ltd.

      Dec 2002 - Jul 2003
      Technical Support Engineer

      • Managing and monitoring of Netgear routers operating at customer end.• To provide technical support to all kind of networking issues related to Routing and relaying.• To provide effective solution to VPN related issues for Netgear VPN products.• Attending Conference calls with the clients and discussing about the unresolved technical and process issues.• Technical presentations on top issues like Internet security and Wireless Issues.• To Provide WAN support for customers using Frame Relay, PPP and HDLC links. Show less

    • R Systems

      Jul 2003 - Dec 2005
      Sr. Network Security Engineer

      • Managed firewall service offering which involves monitoring of firewalls.• Monitoring incident detection, incident response, incident notification.• To facilitate the business in updating its Disaster Recovery plans.• Identified the existing security vulnerabilities on various systems.• Gained better cost proposition by doing the activity from India.• Review event logs,• Real Time monitoring for intrusive attacks.• Executive reports indicating attacks with risk levels involved and necessary actions to avoid entering high-risk attacks• Managing Watchguard IDS system.• Service Level Commitments for reporting, event notification, response time, policy change, patches/ upgrades and return-to-service guarantees• Configuring different kind of VPN connection as per clients requirements Show less

    • FIS

      Dec 2005 - now

      • To Direct the functions, processes, and operations of the SOC and ensuring policies and procedures, and objectives are aligned with client goals.• Managing the operations of the SOC to ensure optimal identification/resolution of security incidents, and enhance client security.• Manage the collection, documentation and research of security incidents received via the SOC.• Monitor key performance indicators, determine gaps in performance metrics, and recommend/execute change management techniques for efficiency/quality improvements.• Oversee the monitoring, identification and resolution of security incidents to detect threats through analysis, investigations and prioritization of incidents based on risk/exposure.• Manage outsourced SOC services for quality performance and fulfillment of Service Level Agreements (SLA).• Develop and maintain an incident response management program that includes incident detection, analysis, containment, eradication, recovery and chain of evidence/ forensic artifacts required for additional investigations.• Develop, maintain, and submit SOC compliance reports as required by the client• Develop appropriate response strategies based on intelligence received• Communicate threats to Senior Management which may impact the client• Analyze applications functionality and new technologies to optimize effective/efficient incident review by staff and minimize client risk• Conduct scheduled and ad hoc training exercises to ensure staff are current with the latest threats and incident response techniques• Oversee and develop strategies to identify, detect, and prevent fraudulent activity• Perform supervisory/managerial responsibilities• Ensure adequate/skilled resources hiring.• Establish performance goals and priorities• Prepare, conduct and review performance appraisals• Develop, mentor and counsel resources.• Ensure efficiency of operations. Show less • To lead the team of 3 Tech leads and 9 Engineers to achieve client delivery.• To discuss project quality, client and team satisfaction, and project success metrics during regularly scheduled and ad hoc project review meetings with the director delivery.• To identify, track, manage and mitigate risk on specific client engagements.• To escalate the issues when necessary to ensure minimal impact to quality, budget, and timeline.• Determine project roles of team members based on project requirements, timeframes and budget.• To work with external contractors in addition to internal resources.• Define skill sets (competencies) required for the project based on project specifications and requirements.• Determine resource requirements (including staffing, software, hardware, and facilities) of projects, based on project specifications.• To ensure project meets internal and client expectations with respect to quality, budget, delivery timelines, and strategy.• To communicate effectively with clients to identify needs and evaluate alternative business solutions.• To track and report team hours and expenses on a weekly basis.• To lead the team to prioritize signed off project work based on analysis of strategic importance, tasks outstanding, obstacles or barriers, resources and deadlines.• To create, or participate in the creation of, project documentation.• To evaluate all key project deliverables, as well as final product to ensure traceability of requirements, high quality and client acceptance. Show less • Involves vulnerability assessment of different networks.• Making reports of current security posture.• Making reports on security scanning.• Giving recommendations about security holes and patching of vulnerabilities• Accessment of vulnerabilities in relevance to Common Vulnerability and Exposure (CVE) and BID databases. • Fingerprinting Exploits from System and Application Log Files using Socrates Tool.• Evaluation of current system by conducting a security vulnerability assessment of facilities, systems and policies currently in place to find any risks that may confront mission-critical applications.• Use of Socrates Information Development Tool which provides realtime events using different IDS/IPS signatures. • To Investigated & responded to security threats from external/internal sources.• Authoring and implementing security policies and procedures. Show less

      • Director-IT Security

        Sept 2023 - now
      • Associate Director - Information Security

        Apr 2019 - Sept 2023
      • IT Security Manager

        Jun 2015 - Mar 2019
      • Project Manager - Information Security

        May 2013 - Jun 2015
      • Project Lead -information security

        Jul 2011 - Apr 2013
      • Team Lead - IT Security

        Apr 2009 - Jun 2011
      • Senior consultant - Information security

        Apr 2007 - Mar 2009
      • Consultant - information security

        Dec 2005 - Mar 2007
  • Licenses & Certifications

    • Verified International Academic Qualifications

      World Education Services (WES)
      View certificate certificate
    • Certified Information Security Manager (CISM)

      ISACA
      May 2020