Professional Documents
Culture Documents
Professional Summary - A seasoned Information Security professional with close to 4 years of diverse
experience in IT and non-IT domains. I carry a rich background in Information Security with extensive
trainings and Masters Degree in Information Security & Computer Forensics from Great Britain. My
progressive hands-on experience in designing, implementation, management and support of various
Information Security solutions on network related components and through knowledge of security techniques
and system gives me a distinct edge when consulting with business on security issues and solutions.
Career Highlights
Expertise in managing Encase & FTK operations in the field of Computer Forensics
Sound knowledge and understanding in ISO 27001:2005 implementation framework and practices in
the area of Information security
Progressive experience in evaluation and Implementation of new security products
Sound Knowledge of performing system security audits for base systems & perimeter security
components and Risk Assessments & Management
Good knowledge and hands on experience in Firewalls, Vulnerability Assessment, Penetration testing,
Endpoint Security solutions
Business Experience
Educational Qualification
Master’s degree in Information Security & Computer Forensics from University of East London, London,
Great Britain
Certifications:
Experience
Technology Experience
Key Projects:
Project I – Bench Mark Study on Security Management & Risk Assessment for London Olympics
2012
As part of fulfillment of final dissertation of Master’s Degree in Information security and Computer
Forensics from University of East London, Great Britain independently complete this 4 months thesis
Project Scope – The scope of the project was to carry out a benchmark study on Security Management &
Risk Assessment for next Olympics 2012 event to take place in London, UK.
As part of the bench mark the following few were considered physical and logical boundaries to carry out the
study
- Host Infrastructure, Assets, Spectators, Sponsors
- Vulnerable Events & Potential Threats, Malicious attacks , Financial Threats
- Security teams & Layers of Security
- Previous Threats and Security Measures
- Security and Geopolitics issue
- Compromises and Constraints
- Limited budget versus infinite demands
- Accessibility versus protection
- Technology versus timescales
- Multi-agency, International approaches versus coordination overheads
- Low-profile versus Pre-emptive policing
- Interactive Simulation Software
- Effective risk assessment by way of ISO 27001:2005 standards with 133 Controls availability for
instantaneous mitigation of threats.
- Plan-Do-Check-Act cycle has to monitor the whole risk assessment integrity.
- Physically collected twelve stadiums architectural information.
- Created hazards scenarios sketch prior to the security plan.
- Maintain Confidentially, Integrity and Availability to sustain the potential standards.
- Delivered in an immovable deadline.
- Distinct indebt survey Legacy, Budget, Impediments plus Impulsive response etc.
Project Summary
There were seven areas of vulnerable risks in this upcoming Olympics event. The specific conclusions and
recommendations on each are as follows: The procurement practices are effectively applied, Games
Delivering against an immovable deadline, Budget and there requirement has to be clearly determined and
effectively managed. Strategy for the lasting Legacy, The structures of Governance and deliveries to
coordinate the group involved in the Games and the multiplicity of organization. And the impact on the
National Lottery causes good. The assets those are vulnerable to attack during Olympics Games. They are
Organizers, Spectators, Host nation and the security itself. By analyzing these assets and the survey conduct
on previous games facing security cautions. The constraints that threats security during Olympics are infinite
security demands and large budget (in period of recession). This obviously creates obstacles to apply risk
based assessment to allocate the security resources. Delays in construction would disturb the security team to
verify and validate the security measurements. The Confidentially, Integrity and Availability procedure need
to follow to sustain for potential hazards. Hazards scenario had to be sketch prior to the security plan. The
risk assessment and security management is compulsory to mitigate the threats and vulnerabilities by
applying 133 controls of ISO 27001 standards on Olympics.
Project II- Antivirus Product Assessment and Conduct lab based Competitive Benchmark against Key
Competitors for Worlds’ Number One Software Organization.
• Out of box feature testing and their effectiveness for the mentioned products
• Usability testing of the products
• Manual performance test – connectivity, performance of the desktop
• Comprehensive analysis of reporting and logging
• Comparison of supported product features and type of threats detected :
– Virus , Spyware, Trojan, Rootkits, Worms
• Prepare Competitive Benchmark Reports, Battle Cards, Analysis graph’s and case studies for each
product on following features:
Ease of Administration, Ease of Integration into current infrastructure, Cost, Auditing Features, User
Friendliness, Response Time to Update the Product for New Threats, Quality of Reporting etc.
\
Reference available on Request.
PERSONAL PROFILE