
Timeline
About me
GRC Analyst | IT Security, NIST CSF
Education

University of denver
2018 - 2019Certificate software design and programming a
University of denver
2018 - 2020Masters of science in ict information systems security aGraduate Student at the University of Denver from June 2018 to pursue a Master of Science degree in Information and Communications Technology, with a focus on Information Systems Security and a certificate in Software Design and Programming.

Rajasthan technical university
2007 - 2011Bachelor's degree computer engineering
Experience

Tata consultancy services
Jan 2012 - Mar 2018It analyst
The buffett way financial coaching
Mar 2019 - Jun 2019Software developer(intern)• Researching, designing, implementing and managing software programs• Testing and evaluating new programs• Identifying areas for modification in existing programs and subsequently developing these modifications• Writing and implementing efficient code

Sonoco metal packaging
Jun 2019 - Jan 2022• Supervising daily tasks of the IT Security Team• Project manage key IT Security Initiatives• Lead forensics of potential as well as identified cyber-Incidents• Support for incident response process improvements and table-top exercises to validate emergency preparedness program success• Analyze available threat data, assess the possible impact, and action that intelligence to determine which mitigations or controls can assist in preventing any attacks• Utilize strong analytical and problem-solving skills to identify security threats and risks to the enterprise• Guided implementation of company-wide enterprise security strategy and roadmap in compliance with NIST CSF & CIS control Framework.• Formalize IT Risk Register Management Process and Conduct Quarterly Risk Acceptance Exercise with IT Management• Conduct Privilege Access and Separation of Duty Review of key IT Applications across enterprise.• Review Audit Reports, Security Certifications like SOC2, SOC3 ISO 27001 and ISO 9001 etc. for critical third-party IT applications and perform vendor risk assessment• Leverage Security tool and technologies like Windows Defender ATP, Cloud App Security, Microsoft Intune, Forti Analyzer, Qualys Vulnerability Management, O365 Security and Compliance, Knowbe4 to improve the security posture of the organization.• Conduct phishing campaigns, security awareness, training, and education across enterprise. • Work alongside IT leadership and other business users to provide support with various activities on key strategic initiatives • Manage specific activities within various Cybersecurity initiatives (i.e. communications, test planning, etc.) • Reach out and communicate with various orgs inside and outside of IT • Create and update project-related documents like Information Security Policies, Processes and Procedures, issue logs, test logs, project plans, training materials, guidelines, security best practices etc. Show less • Analyze available threat data, assess the possible impact and action that intelligence to determine which mitigations or controls can assist in preventing any attacks• Support for incident response process improvements and table-top exercises to validate emergencypreparedness program success• Enhance security awareness, training, and education program• Provide support for various cybersecurity and information assurance activities• Utilize strong analytical and problem-solving skills to identify security threats and risks to the enterprise• Create/analyze security process documentation to increase efficiency• Work alongside IT leadership and other business users to provide support with various activities on key strategic initiatives• Manage specific activities within various Cybersecurity initiatives (ie: communications, test planning, etc)• Reach out and communicate with various organization inside and outside of IT• Assist with the review and updates to IT SharePoint Security Website• Assist with the review and updates of IT Security Controls, Processes & Templates Show less
IT Cyber Security Analyst
Apr 2020 - Jan 2022Cyber Security Intern
Jun 2019 - Apr 2020

Sonoco
Jan 2022 - now- Work closely with IT, HR, Compliance, and other departments to align security awareness efforts with overall security strategy and compliance requirements.- Plan and execute simulated phishing campaigns to test employee responses and improve awareness. - Responsible for development of policies and procedures to align with industry standards and regulatory requirements- Assist with NIST CSF Risk Assessments and gap analysis to identify areas for improvement and ensure compliance- Collaborate cross functionally with IT and Compliance teams to address security issues and implement controls- Develop and maintain comprehensive metrics and reporting dashboards for executive management, providing insights into compliance and risk posture- Ensure third-party vendors adhere to security requirements and mitigating potential risks- Evaluating new regulatory and industry best practices related to information security and data privacy- Demonstrated track record of successfully executing projects with an emphasis on delivering results Show less • Conduct in-depth analysis of email threats, including phishing attacks, spear phishing, business email compromise (BEC), and ransomware campaigns. • Develop and maintain a comprehensive understanding of the evolving tactics, techniques, and procedures (TTPs) used by threat actors in email-based attacks.• Collaborate with cross-functional teams to investigate and analyze suspicious emails and campaigns, providing actionable insights and recommendations for detection and response.• Utilize threat intelligence platforms, open-source intelligence (OSINT) tools, and internal data sources to gather, correlate, and analyze threat indicators.• Up to date knowledge on industry trends, security vulnerabilities, and email security best practices to effectively anticipate and counter emerging threats.• Create threat intelligence reports, including indicators of compromise (IOCs), network and host-based indicators, and behavioral patterns.• Share knowledge and expertise through documentation, presentations, and training sessions to enhance the overall security awareness and capabilities of the organization.• Successfully accomplished the project to deploy Vulnerability Management Solution in 20,000+ Assets coordinating with cross functional teams within 3 months.• Manage Enterprise-wide Phishing Security Awareness Training Program and Phishing Campaigns• Identify, categorize, prioritize, and investigate correlated events and perform investigation and triage of events and incidents and escalate• Third Party Vendor Risk Assessment Show less
GRC Analyst 2
Sept 2023 - nowSecurity Operations Analyst III
Jan 2022 - Sept 2023
Licenses & Certifications
- View certificate

Negotiation skills
LinkedinMar 2020 
Oracle database: sql certified expert certification
Oracle- View certificate

Threat hunting essential training
LinkedinAug 2023 - View certificate

Time management: working from home
LinkedinMar 2020 - View certificate

Learning excel 2019
LinkedinMar 2020 - View certificate

Sscp cert prep: 1 access controls
LinkedinMar 2020 - View certificate

Sscp cert prep: 2 security operations and administration
LinkedinApr 2020 - View certificate

Cisa cert prep: 1 auditing information systems for is auditors
LinkedinAug 2023 - View certificate

Wordpress: developing secure sites
LinkedinSept 2020 
Database design
UdemyDec 2018
Recommendations

Geraud nangue tasse
Reinforcement Learning Researcher | LecturerCity of Johannesburg, Gauteng, South Africa
Fabián cameras
Profesional con Experiencia en Tecnologías de la Información y Operaciones en el Sector Financiero y...Toluca, México, Mexico
Ravichandra k.
Lead software engineer at SimplifyvmsHyderabad, Telangana, India
Fernando limon, fmm
Hospital Facility Manager at Kindred Hospital Westminster & Kindred Hospital Santa AnaWestminster, California, United States
Damith gunasena
Versatile Professional in Customer Service, Supply Chain & Banking | Skilled in Team Leadership, Ope...Christchurch, Canterbury, New Zealand
Aditi kale
System Engineer at Tata Consultancy Services | PLM | Agile | QA | CS Grad '20Pune, Maharashtra, India
Krishna dheeraj ranga
Cybersecurity Analyst | Penetration Testing | CompTIA Security+ & CEH Certified | Securing Networks ...Buffalo Grove, Illinois, United States
Abhinav chavan
Quality Engineer at FinastraBengaluru, Karnataka, India
Jessica senee
Principal Clerk at City of LeominsterLeominster, Massachusetts, United States
Aiman muhsin mohamed zaini
Global Inspection Services for Compliance, Assurance & PerformancePutrajaya, Putrajaya Federal Territory, Malaysia
Miral kothiya
Data TechnicianCary, North Carolina, United States
Adam chamberlain
Senior Project Manager, CEng MCIBSEGreater Brighton and Hove Area
Cibele moraes
Business Manager & Account Executive | VitrioLisboa, Lisboa, Portugal
Casey hickman
CCNALawton Area
Ashutosh sharma
Software EngineerHimachal Pradesh, India
Brenda t
Social WorkerGreater Toronto Area, Canada
Syeda alishba sheraz bukhari
Food technologist| Faculty Member at Hamdard University| Trainer and Product Development consultant ...Karachi Division, Sindh, Pakistan
Allan ramella
CybersecurityProvidence County, Rhode Island, United States
Devika s
Opentext Exstream | HP Exstream | Messagepoint | Cognizant | Ex-infoscianMysore, Karnataka, India
Alessandro eugenio pellegrini
Medical Doctor | RadiologistItaly
...