Cybersecurity professional with 7 years of experience in both IT and OT environments. Expertise in risk assessment, threat detection, incident response, and vulnerability management. Demonstrated ability to protect critical infrastructure and data, ensuring comprehensive security across IT and OT systems in compliance with industry standards. A strategic and effective communicator, committed to enhancing security measures and mitigating potential risks.
Experienced in cybersecurity testing, compliance audits, and risk assessments for banking clients. Led IT security projects, developed security policies, and implemented system security plans to ensure compliance and risk mitigation. Managed ticketing systems, user access controls, and security evaluations while identifying and resolving security issues. Secured banker credit card systems, safeguarding sensitive financial data from potential threats. Applied risk management techniques to track and report project risks, providing security support to colleagues and customers in fast-paced environments.
Developed and implemented cybersecurity governance policies to ensure compliance and risk management. Conducted security awareness programs to educate employees on threats and best practices. Monitored policy adherence, identified gaps, and recommended improvements. Collaborated with leadership and teams to strengthen security governance frameworks. Regularly reviewed and updated policies to align with evolving threats and business needs.
Performed vulnerability assessments across IT and OT systems, identifying and prioritizing security risks. Coordinated timely patch management and implemented proactive measures to reduce the attack surface. Utilized tools like Otorio for continuous monitoring and collaborated with teams to address vulnerabilities with minimal operational impact. Prepared reports on risk mitigation and compliance while integrating threat intelligence into the security program.
Managed endpoint security solutions, including SentinelOne, to protect IT and OT systems from threats. Conducted security assessments, configured firewalls, and implemented encryption to safeguard data. Monitored endpoint activities, ensured timely patching, and provided recommendations for enhanced protection.
Configured security tools for malware scans, network traffic monitoring, and threat alerts. Established scheduled scans based on asset usage to minimize disruptions. Monitored security alerts to detect malware infections and suspicious activity.
Regularly tested backup and recovery procedures to ensure data integrity and successful restoration. Reviewed and updated backup plans to align with evolving data volumes, infrastructure, and business needs.