SlideShare a Scribd company logo
1 of 6
MANEAN KVS
Contact: +91 9841503795; manean@rediffmail.com
INFORMATION SECURITY SPECIALIST
 11 years of experience in network security& Information Security.
 Expertise on Vulnerability assessment and Remediation fix, Compliance audit scan on NIST standards
 Specialist on Open-source Firewalls, Ip-tables, IP-cop, Juniper and Fort iGATE Firewalls
 Good Knowledge and Adaptability on Open-source SIEM tools like Octopussy, Security onion, OSSIM.
 OWASP Web app scanning tools
 PCIDSS Audit implementation for certification
TECHNICAL SKILLS
 Security Products/Applications: FortiGate, Squid T-Proxy, Routers, IP tables, DNS, NIS, NFS, Sniffer
Pro, Ldap.
 Vulnerability Assessment: Nessus, Found stone, ISS Site Protector, ISS InternetScanner, ISS System
Scanner, and Metasploit, N-Stalker, Web-Inspect, SSL Digger, Kismet
 Exploiting Tools: NMAP,NCRACK, Nessus,NXPOSE,openVAS,License Crackers, DDoS tools, John the
Ripper, hping, Dsniff,goldfinger etc.,
 Linux Skills: SAMBA, SQUID, Apache, NAT, DNS, SSH, Linux as Router, Experience on Firewall
configuration, Kernel Configuration, and Kernel Compilation, Concurrent Version Systems, Class
Based Queue Bandwidth Management, LDAP, Send-mail, DNS, Postfix, qmail configuration, High
Availability Clustering etc.
 Intrusion Detection Systems: Snort ,SIEM, Opensource-Security Onion, & Alienvault Pilot Setup.
 Forensics : File Scrubber, Foundstone Forensics Tool kit, Stellar phoenix
 Admin Tools :Nagios, linuxconf, vmstat, iostat, top, traceroute, ping, sar, ntop, webmin
 Database Auditing : Scanning Database Servers (ORACLE & MS-SQL) scanning patch updates,auditing
user privileges for tables and databases
 Data Leak Prevention : Pawaa, Websense
 Security Audit Recommendation & Implementation without any Business on Information
Security Standarads
 PCIDSS audit implementation for organization
PROFESSIONAL EXPERIENCE
Plintron Technologies Private Limited since June 16 2014
Lead Information Security
 Data Centre Audit
 Vulnerability Assessment & Penetration Testing
 Source Code Audit
 DLP Solution
 VLAN Audit
 Patch Policy Implementation Guideline
 Proof of Concept on latest technologies
 Audit Framework on PCIDSS Scan & Audit
 Policy Audit on ISMS policies
 Setting up isms quiz and security awareness for organization employees
 Pcidss audit implementation 3.1 for organization
 CPISI certified version 3.1 from sisa
November 2009 to 2014
Temenos India Pvt Ltd.
Senior Specialist –IT Domain – Banking and Finance
 Risk Assessment and Vulnerability Assessment and Penetration Testing for Temenos Global offices
Regions like UK, US, Geneva, Bucharest, Belgium, Lausanne, Germany, Paris and India
 Remediation Fix on VA scan and Penetration Testing.
 OS Hardening on Unix and Windows
 Updating and Monitoring Security Patches and Hot Fix for Window Servers
 Active directory audit
 BCP—coordinator RTO & RPO Analysis audit for criticaldevices and servers
 Handling ISMS Audit-policy and procedure updates
 Oracle Database Auditing reviewing security Patches periodically
 WLAN Security scanning
2014-2015(Jan-June10-2014)
Unified Threat Management analysis on Alinevault Ossim Recommendation
Alienvault Threat logs analysis
MBAM –disk encryption compliance & auditing
Zscaler cloud webproxy testing
Regular VA Scan for every quarter & Remediation fix and followup
Policies on BYOD Implementation Recommendation
Cloud-Services Auditing implementation & Recommendation –Intermeidiate level
Centralized Symantec Antivirus Management Recommendation
2013 – 2014
 Risk Assessment – VAPT for Servers & network devices
 Webapplication/Servers Security Scan on OWASP TOP Ten Standarads
 Implementing SSL cert authentication for critical servers internally and externally
 Periodic Vulnerability assessment Scan and Remediation Fix
 Patch Management and Simulation,Implementation
 OS Hardening Guidelines
 Policy and standards for all OS flavors & network devices
 NIST Standard Compliance Scan using Nessus for all OS flavors
2012 – 2013
 Risk Assessment – VAPT for Servers & network devices
 Implementing SSL cert authentication for critical servers internally and externally
 Active Directory Audit
 Periodic Vulnerability assessment Scan and Remediation Fix
 Patch Management and Implementation
 OS Hardening Guidelines
 Policy and standards for all OS flavors & network devices
 NIST Standard Compliance Scan using Nessus for all OS flavors
2011 – 2012
 Vulnerability assessment and Penetration Testing on Temenos Global office
 SSL certificate Audit and scan
 Security onion tool implementation
 Application Hardening Guidelines
Apr 2010 – Oct 2010
 SSL Cert Server Implementation
 OSSIM Alien-vault pilot server implementation
 E&Y external audit coordination on Global Penetration Audit
Gen Pact. Feb 2009 – Jul 2009
SOC Technical consultant
 Vulnerability Assessment (VA) and VA Server Implementation
 System Audit
 Maintaining SNORT IDS Servers with Net Forensic logs correlation
 Logs and Packet Analyzing
 Worked for Client (Ge-Fleet)
 Vulnerability Assessment for Client LAN Desktops
 Sophos Antivirus Administration
 Snort Server Implementation on Different Network Architecture
Feb 2009 – Aug 2009
 Network Security monitoring for SOC Client - Snort IDS monitoring & analyzing critical alerts with
Netforenscis
 Vulnerability assessment and remediation fix
 Updating latest Snort rules & signatures
Cybernet Slash Support – CSSCorp Sep 2007 to Nov 2008
Senior system administrator (IT security)
 Vulnerability Assessment (VA) and Remediation fix& System Audit
 Handling Juniper Net screen Firewall ISG 1000, SSG 550M, NS204, NS50.
 Configuring Firewall Interfaces & Zones by Trust, Untrust & DMZ Zone.
 Establishing and Managing firewall Policies and rules.
 Establishing & Configuring Site-Site VPN connectivity.
 Configuring VPN connectivity with Policy based and Route based VPN.
 Configuring Firewall Routing entries based on source & destination route.
 Implementing and Monitoring Servers (NTOP, CACATI & SYSLOG -NG)
 Policy Restrictions in Firewalls and Servers
 Maintaining SNORT IDS Servers.
 Web sense Enterprise (Content Filtering with ADS login Setup)
 Installation and Maintenance of Octopussy-Server (SIM/SIEM Tool)
 Net screen Firewall Administration
Sep 2007 to Nov 2008
 SIEM implementation - Octopussy
 Vulnerability assessment & Remediation fix
 ISMS 27001 Audit implementation
 Juniper Firewall administration
Sify Ltd. SinceJan 2005 to Jul 2007
System Engineer
 Vulnerability Assessment (VA)
 Kernel Customization in Red-hat Linux.
 Ip-tables configuration.
 Proxy Server Implementation.
 OS Hardening for Windows, Linux, Solaris.
 Implementing and Monitoring IDSlogs and review – SNORT
[Front end Tool: BASE, ACID, and Honey net Security Console]
 Access control auditing for Data Center
 Responding to security incidents
 Conducting Internal Vulnerability assessment periodically
 Periodic Risk assessment E.g. Hack Incidents or Phishing Attacks
 Auditing of Firewall Conduits Generating reports.
Jan 2005 – Jul 2007
 Linux Firewall Server Implementation.
 NIDS Implementation
 Squid-T proxy Implementation on all Sify lan
 OS Hardening
 Vulnerability Assessment and IDSLogs monitoring for Sify Safe Crypt
 ISMS SOC Audit
 Web Application Security Scan
Offshore Security InfrastructureManagement Services:
Vulnerability & Patch Management
 Evaluating current risks and threats to the environment for gapremediation&assistance in making
the information processing facilities more secure
 Vulnerability assessment of critical servers and other network devices using ISS Internet Scanner,
Foundstone and Nessus.
 System compliance profiling by ISS System Scanner
 Categorizing assets and developing deployment plans for security patch installations.
 Recommendations for hardening the network devices.
CERTIFICATIONS
 Certified Ethical Hacker (CEH)
 Information Technology Infrastructure Library (ITIL -Foundation)
 EC-Council Security Analyst/Licensed Pen Tester(ESA/LPT)
 Trained in ISMS-27001-LA Auditor(BSI)
 CPISI audit certified from (SISA)
EDUCATION
 Master of Computer Applications – Bharathidasan University, Trichy. (2004)
 Bachelor of Arts(Corp Sec.ship)– University of Madras,Chennai(2000)
Declaration
I affirm that all the above particulars are true to the best of my knowledge and Belief
Date – Yours sincerely,
Place – CHENNAI [MANEAN.KVS]

More Related Content

What's hot

Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSJohn Gilligan
 
Introduction: CISSP Certification
Introduction: CISSP CertificationIntroduction: CISSP Certification
Introduction: CISSP CertificationSam Bowne
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center FundamentalAmir Hossein Zargaran
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckSlideTeam
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkPECB
 
CCNA Security - Chapter 3
CCNA Security - Chapter 3CCNA Security - Chapter 3
CCNA Security - Chapter 3Irsandi Hasan
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)Ahmed Ayman
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1Priyanka Aash
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber SecurityNikunj Thakkar
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3Tanmay Shinde
 
Information security governance
Information security governanceInformation security governance
Information security governanceKoen Maris
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellenceErik Taavila
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security StrategyAndrew Byers
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Edureka!
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Mukesh Chinta
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)PECB
 
Security audits & compliance
Security audits & complianceSecurity audits & compliance
Security audits & complianceVandana Verma
 

What's hot (20)

Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHS
 
Introduction: CISSP Certification
Introduction: CISSP CertificationIntroduction: CISSP Certification
Introduction: CISSP Certification
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete Deck
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
CCNA Security - Chapter 3
CCNA Security - Chapter 3CCNA Security - Chapter 3
CCNA Security - Chapter 3
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
Information security governance
Information security governanceInformation security governance
Information security governance
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
 
IT Risk Management
IT Risk ManagementIT Risk Management
IT Risk Management
 
Security audits & compliance
Security audits & complianceSecurity audits & compliance
Security audits & compliance
 
Vulnerability and Patch Management
Vulnerability and Patch ManagementVulnerability and Patch Management
Vulnerability and Patch Management
 

Viewers also liked

Bruce Walker Resume June 2015
Bruce Walker Resume June 2015Bruce Walker Resume June 2015
Bruce Walker Resume June 2015Bruce Walker
 
Top 8 materials controller resume samples
Top 8 materials controller resume samplesTop 8 materials controller resume samples
Top 8 materials controller resume samplesrichsifuma
 
1 year experiances resume of mba finance
1 year experiances resume of mba finance1 year experiances resume of mba finance
1 year experiances resume of mba financeBabasab Patil
 

Viewers also liked (8)

AhmetCemilKaratas
AhmetCemilKaratasAhmetCemilKaratas
AhmetCemilKaratas
 
manigandan Resume
manigandan Resumemanigandan Resume
manigandan Resume
 
s.k - Resume
s.k - Resumes.k - Resume
s.k - Resume
 
Bruce Walker Resume June 2015
Bruce Walker Resume June 2015Bruce Walker Resume June 2015
Bruce Walker Resume June 2015
 
Top 8 materials controller resume samples
Top 8 materials controller resume samplesTop 8 materials controller resume samples
Top 8 materials controller resume samples
 
RAJESHYADAV- Logistics CV
RAJESHYADAV- Logistics CVRAJESHYADAV- Logistics CV
RAJESHYADAV- Logistics CV
 
1 year experiances resume of mba finance
1 year experiances resume of mba finance1 year experiances resume of mba finance
1 year experiances resume of mba finance
 
Michael Bowers Resume
Michael Bowers ResumeMichael Bowers Resume
Michael Bowers Resume
 

Similar to Resume

David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson
 
Prabhu Resume
Prabhu ResumePrabhu Resume
Prabhu ResumePrabhu P
 
AKS IT Corporate Presentation
AKS IT Corporate PresentationAKS IT Corporate Presentation
AKS IT Corporate Presentationaksit_services
 
Pramod Yadav_Security Operations Center Manager
Pramod Yadav_Security Operations Center ManagerPramod Yadav_Security Operations Center Manager
Pramod Yadav_Security Operations Center ManagerPramod Yadav
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA Cyber Security
 
Willard_Grayson_201505
Willard_Grayson_201505Willard_Grayson_201505
Willard_Grayson_201505Will Grayson
 
Dhishant -Latest Resume
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest ResumeDhishant Abrol
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsEnergySec
 
Zankhana Pandya Resume @ 21_Dec_2015
Zankhana Pandya Resume @ 21_Dec_2015Zankhana Pandya Resume @ 21_Dec_2015
Zankhana Pandya Resume @ 21_Dec_2015Zhankhana Pandya
 
Cloud Security vs Security in the Cloud
Cloud Security vs Security in the CloudCloud Security vs Security in the Cloud
Cloud Security vs Security in the CloudTjylen Veselyj
 

Similar to Resume (20)

David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
 
Jatinder Singh
Jatinder SinghJatinder Singh
Jatinder Singh
 
Prabhu Resume
Prabhu ResumePrabhu Resume
Prabhu Resume
 
Security analyst
Security analystSecurity analyst
Security analyst
 
Aksit profile final
Aksit profile finalAksit profile final
Aksit profile final
 
AKS IT Corporate Presentation
AKS IT Corporate PresentationAKS IT Corporate Presentation
AKS IT Corporate Presentation
 
Mohammad Tahir_CV
Mohammad Tahir_CVMohammad Tahir_CV
Mohammad Tahir_CV
 
Pramod Yadav_Security Operations Center Manager
Pramod Yadav_Security Operations Center ManagerPramod Yadav_Security Operations Center Manager
Pramod Yadav_Security Operations Center Manager
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
 
resume IT security
resume IT securityresume IT security
resume IT security
 
CV_A-Barakat
CV_A-BarakatCV_A-Barakat
CV_A-Barakat
 
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  YrsFinto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
 
Willard_Grayson_201505
Willard_Grayson_201505Willard_Grayson_201505
Willard_Grayson_201505
 
Dhishant -Latest Resume
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest Resume
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
 
Zankhana Pandya Resume @ 21_Dec_2015
Zankhana Pandya Resume @ 21_Dec_2015Zankhana Pandya Resume @ 21_Dec_2015
Zankhana Pandya Resume @ 21_Dec_2015
 
Shashikant Chavan_Resume
Shashikant Chavan_ResumeShashikant Chavan_Resume
Shashikant Chavan_Resume
 
Cloud Security vs Security in the Cloud
Cloud Security vs Security in the CloudCloud Security vs Security in the Cloud
Cloud Security vs Security in the Cloud
 
Ids & ips
Ids & ipsIds & ips
Ids & ips
 
Manjesh cv
Manjesh cvManjesh cv
Manjesh cv
 

Resume

  • 1. MANEAN KVS Contact: +91 9841503795; manean@rediffmail.com INFORMATION SECURITY SPECIALIST  11 years of experience in network security& Information Security.  Expertise on Vulnerability assessment and Remediation fix, Compliance audit scan on NIST standards  Specialist on Open-source Firewalls, Ip-tables, IP-cop, Juniper and Fort iGATE Firewalls  Good Knowledge and Adaptability on Open-source SIEM tools like Octopussy, Security onion, OSSIM.  OWASP Web app scanning tools  PCIDSS Audit implementation for certification TECHNICAL SKILLS  Security Products/Applications: FortiGate, Squid T-Proxy, Routers, IP tables, DNS, NIS, NFS, Sniffer Pro, Ldap.  Vulnerability Assessment: Nessus, Found stone, ISS Site Protector, ISS InternetScanner, ISS System Scanner, and Metasploit, N-Stalker, Web-Inspect, SSL Digger, Kismet  Exploiting Tools: NMAP,NCRACK, Nessus,NXPOSE,openVAS,License Crackers, DDoS tools, John the Ripper, hping, Dsniff,goldfinger etc.,  Linux Skills: SAMBA, SQUID, Apache, NAT, DNS, SSH, Linux as Router, Experience on Firewall configuration, Kernel Configuration, and Kernel Compilation, Concurrent Version Systems, Class Based Queue Bandwidth Management, LDAP, Send-mail, DNS, Postfix, qmail configuration, High Availability Clustering etc.  Intrusion Detection Systems: Snort ,SIEM, Opensource-Security Onion, & Alienvault Pilot Setup.  Forensics : File Scrubber, Foundstone Forensics Tool kit, Stellar phoenix  Admin Tools :Nagios, linuxconf, vmstat, iostat, top, traceroute, ping, sar, ntop, webmin  Database Auditing : Scanning Database Servers (ORACLE & MS-SQL) scanning patch updates,auditing user privileges for tables and databases  Data Leak Prevention : Pawaa, Websense  Security Audit Recommendation & Implementation without any Business on Information Security Standarads  PCIDSS audit implementation for organization PROFESSIONAL EXPERIENCE Plintron Technologies Private Limited since June 16 2014 Lead Information Security  Data Centre Audit  Vulnerability Assessment & Penetration Testing  Source Code Audit  DLP Solution  VLAN Audit  Patch Policy Implementation Guideline  Proof of Concept on latest technologies  Audit Framework on PCIDSS Scan & Audit  Policy Audit on ISMS policies
  • 2.  Setting up isms quiz and security awareness for organization employees  Pcidss audit implementation 3.1 for organization  CPISI certified version 3.1 from sisa November 2009 to 2014 Temenos India Pvt Ltd. Senior Specialist –IT Domain – Banking and Finance  Risk Assessment and Vulnerability Assessment and Penetration Testing for Temenos Global offices Regions like UK, US, Geneva, Bucharest, Belgium, Lausanne, Germany, Paris and India  Remediation Fix on VA scan and Penetration Testing.  OS Hardening on Unix and Windows  Updating and Monitoring Security Patches and Hot Fix for Window Servers  Active directory audit  BCP—coordinator RTO & RPO Analysis audit for criticaldevices and servers  Handling ISMS Audit-policy and procedure updates  Oracle Database Auditing reviewing security Patches periodically  WLAN Security scanning 2014-2015(Jan-June10-2014) Unified Threat Management analysis on Alinevault Ossim Recommendation Alienvault Threat logs analysis MBAM –disk encryption compliance & auditing Zscaler cloud webproxy testing Regular VA Scan for every quarter & Remediation fix and followup Policies on BYOD Implementation Recommendation Cloud-Services Auditing implementation & Recommendation –Intermeidiate level Centralized Symantec Antivirus Management Recommendation 2013 – 2014  Risk Assessment – VAPT for Servers & network devices  Webapplication/Servers Security Scan on OWASP TOP Ten Standarads  Implementing SSL cert authentication for critical servers internally and externally  Periodic Vulnerability assessment Scan and Remediation Fix  Patch Management and Simulation,Implementation  OS Hardening Guidelines  Policy and standards for all OS flavors & network devices  NIST Standard Compliance Scan using Nessus for all OS flavors 2012 – 2013
  • 3.  Risk Assessment – VAPT for Servers & network devices  Implementing SSL cert authentication for critical servers internally and externally  Active Directory Audit  Periodic Vulnerability assessment Scan and Remediation Fix  Patch Management and Implementation  OS Hardening Guidelines  Policy and standards for all OS flavors & network devices  NIST Standard Compliance Scan using Nessus for all OS flavors 2011 – 2012  Vulnerability assessment and Penetration Testing on Temenos Global office  SSL certificate Audit and scan  Security onion tool implementation  Application Hardening Guidelines Apr 2010 – Oct 2010  SSL Cert Server Implementation  OSSIM Alien-vault pilot server implementation  E&Y external audit coordination on Global Penetration Audit Gen Pact. Feb 2009 – Jul 2009 SOC Technical consultant  Vulnerability Assessment (VA) and VA Server Implementation  System Audit  Maintaining SNORT IDS Servers with Net Forensic logs correlation  Logs and Packet Analyzing  Worked for Client (Ge-Fleet)  Vulnerability Assessment for Client LAN Desktops  Sophos Antivirus Administration  Snort Server Implementation on Different Network Architecture Feb 2009 – Aug 2009  Network Security monitoring for SOC Client - Snort IDS monitoring & analyzing critical alerts with Netforenscis  Vulnerability assessment and remediation fix  Updating latest Snort rules & signatures Cybernet Slash Support – CSSCorp Sep 2007 to Nov 2008 Senior system administrator (IT security)  Vulnerability Assessment (VA) and Remediation fix& System Audit
  • 4.  Handling Juniper Net screen Firewall ISG 1000, SSG 550M, NS204, NS50.  Configuring Firewall Interfaces & Zones by Trust, Untrust & DMZ Zone.  Establishing and Managing firewall Policies and rules.  Establishing & Configuring Site-Site VPN connectivity.  Configuring VPN connectivity with Policy based and Route based VPN.  Configuring Firewall Routing entries based on source & destination route.  Implementing and Monitoring Servers (NTOP, CACATI & SYSLOG -NG)  Policy Restrictions in Firewalls and Servers  Maintaining SNORT IDS Servers.  Web sense Enterprise (Content Filtering with ADS login Setup)  Installation and Maintenance of Octopussy-Server (SIM/SIEM Tool)  Net screen Firewall Administration Sep 2007 to Nov 2008  SIEM implementation - Octopussy  Vulnerability assessment & Remediation fix  ISMS 27001 Audit implementation  Juniper Firewall administration Sify Ltd. SinceJan 2005 to Jul 2007 System Engineer  Vulnerability Assessment (VA)  Kernel Customization in Red-hat Linux.  Ip-tables configuration.  Proxy Server Implementation.  OS Hardening for Windows, Linux, Solaris.  Implementing and Monitoring IDSlogs and review – SNORT [Front end Tool: BASE, ACID, and Honey net Security Console]  Access control auditing for Data Center  Responding to security incidents
  • 5.  Conducting Internal Vulnerability assessment periodically  Periodic Risk assessment E.g. Hack Incidents or Phishing Attacks  Auditing of Firewall Conduits Generating reports. Jan 2005 – Jul 2007  Linux Firewall Server Implementation.  NIDS Implementation  Squid-T proxy Implementation on all Sify lan  OS Hardening  Vulnerability Assessment and IDSLogs monitoring for Sify Safe Crypt  ISMS SOC Audit  Web Application Security Scan Offshore Security InfrastructureManagement Services: Vulnerability & Patch Management  Evaluating current risks and threats to the environment for gapremediation&assistance in making the information processing facilities more secure  Vulnerability assessment of critical servers and other network devices using ISS Internet Scanner, Foundstone and Nessus.  System compliance profiling by ISS System Scanner  Categorizing assets and developing deployment plans for security patch installations.  Recommendations for hardening the network devices. CERTIFICATIONS  Certified Ethical Hacker (CEH)  Information Technology Infrastructure Library (ITIL -Foundation)  EC-Council Security Analyst/Licensed Pen Tester(ESA/LPT)  Trained in ISMS-27001-LA Auditor(BSI)  CPISI audit certified from (SISA)
  • 6. EDUCATION  Master of Computer Applications – Bharathidasan University, Trichy. (2004)  Bachelor of Arts(Corp Sec.ship)– University of Madras,Chennai(2000) Declaration I affirm that all the above particulars are true to the best of my knowledge and Belief Date – Yours sincerely, Place – CHENNAI [MANEAN.KVS]