V

Vishwak N.

CEO

Bengaluru, Karnataka, India11 yrs 8 mos experience

Key Highlights

  • Over a decade of experience in Information Security.
  • Expertise in vulnerability management and incident response.
  • Proven leadership in security operations and team development.
Stackforce AI infers this person is a Cybersecurity Professional with expertise in IT Security Operations and Risk Management.

Contact

Skills

Core Skills

It Security OperationsIncident ResponseSecurity ResilienceVulnerability ManagementCompliance ManagementThreat ManagementSecurity Policy DevelopmentIt OperationsProject Management

Other Skills

Agile MethodologiesCISCOBITChaos EngineeringCybersecurity Incident ResponseDevSecOpsEthical HackingISO 27001ISO 27002ISO StandardsIT Risk ManagementITILInformation SecurityInformation Security GovernanceInformation Security Risk Management

About

11yrs experienced Information Security Manager and Systems Admin. I assess, plan, and enact security measures to help protect IT infrastructure from security breaches and attacks on its computer networks and systems. My technical expertise is diverse, I administer Systems/Servers, contribute to Cyber Resilience SIEM solutions, Incident response, CSIRT, Vulnerability Management - Governance-compliance, Network & Firewall security, Email Security, GRC, Threat Management, EDR, Chaos Engineering, Security Performance Management, Internal Auditing - ISO 27001, NIST standards and framework. My operational experience includes ITIL, SIX SIGMA, Project Management, Operations & Delivery Management, Stakeholder Management. #BlueTeam #PurpleTeam #ISO/IEC 27001 #NIST # Vulnerability Management #GRC #Chaos Engineering ===================================================== #Splunk #Logrhythm #Crowdstrike #FireEye HX #ProofPoint #Rapid7 #Qualys #Nessus #Cisco Umbrella #BitSight #Jira #Clarizen #ITIL #ServiceNow #ServiceNow GRC ===================================================== With over a decade of experience in Information Security, I'm passionate about securing IT infrastructure against evolving cyber threats. As an Information Security Manager, I've honed my skills in cyber resilience, SIEM solutions, CSIRT, threat and vulnerability management, network and firewall security, email security, GRC, EDR, chaos engineering, and security performance management. My educational journey includes a PGDM in Information Systems Management from Alliance University and a BCA from Bangalore University. In my current role as a Senior Security Analyst at Eurofins Scientific India Pvt Ltd., I lead security operations, incident response, and optimization efforts- maintaining a high SPM score, ensuring optimal security resilience. Previously, as an Assistant Manager at KPMG Global Services Pvt Ltd., I led vulnerability management programs, streamlined processes, managed compliance risks, and fostered cross-functional collaboration. At Mouser Electronics (Part of TTI, Inc.), I conducted risk-driven monitoring, reporting, and incident response, enhancing endpoint security. My tenure at FireEye Cyber Security Pvt Ltd. as an ISS Engineer involved real-time analysis, security event triage, and threat containment using SIEM and FireEye technologies. Let's connect to explore how we can collaborate to enhance security and resilience in the ever-changing digital landscape.

Experience

Everise

Information Technology Security Manager

Feb 2025Present · 1 yr 1 mo

  • Responsibilities:
  • 1. Security Operations Management
  • Oversee daily operations of the Security Operations Center (SOC).
  • Develop, implement, and enforce security policies and procedures.
  • Lead vulnerability scanning, penetration testing, and threat monitoring.
  • Ensure security tools (firewalls, IDS/IPS, DLP, SIEM) are maintained and updated.
  • 2. Incident Response and Management
  • Lead investigations and responses to security incidents and cyberattacks.
  • Conduct root cause analysis and provide post-incident reports.
  • Test and optimize incident response plans regularly.
  • 3. Threat and Vulnerability Management
  • Manage vulnerabilities and threats, implementing mitigation strategies.
  • Conduct risk assessments and security audits.
  • Collaborate with DevOps and infrastructure teams to integrate security best practices.
  • 4. Compliance and Governance
  • Ensure compliance with security regulations and frameworks (ISO 27001, NIST, GDPR).
  • Maintain up-to-date security documentation and processes.
  • Coordinate internal and external security audits.
  • 5. Leadership and Team Development
  • Supervise and mentor junior security analysts and engineers.
  • Provide career development, training, and certification guidance.
  • Collaborate with HR and senior leadership to define team goals.
  • 6. Vendor and Stakeholder Management
  • Manage relationships with third-party vendors for security tools and technologies.
  • Align security objectives with business units (IT, legal, finance).
  • 7. Security Awareness and Training
  • Develop and implement security awareness training for employees.
  • Promote a culture of security awareness across the organization.
  • Key Performance Indicators (KPIs):
  • Reduction in security incidents and breaches.
  • Compliance with industry regulations and standards.
  • Team development and performance improvements.
  • Successful mitigation of vulnerabilities and risks.
IT Security OperationsThreat & Vulnerability ManagementPenetration TestingCybersecurity Incident ResponseSecurity Policy DevelopmentInformation Security Risk Management+16

Eurofins

Senior Information Security Engineer - Security Resilience

Dec 2022Feb 2025 · 2 yrs 2 mos · Hybrid

  • #Security Engineering # Security Governance #Security Resilience
  • Engage in the prioritisation and analysis of security alerts encompassing malware, denial of service, unauthorised access, etc. This involves categorising and assessing issues of varying severity - including recurrent cyber threats, offensive security assessments, tactical threat intelligence, and vendor insights across Eurofins ELE's.
  • Execute thorough incident inquiries and oversee the remediation strategy within the context of SPM - BitSight, Vulnerability Management - Qualys
  • Conduct proactive investigation of network environments to uncover and segregate potential threats.
  • Continuously refine, fine-tune, and oversee SPM - BitSight & Qualys to ensure optimal Security Resilience operations.
  • Liaise and provide regular updates to leadership teams responsible for Cyber Resiliency and Exercise Enablement.
  • Hold responsibility and supervision over the entirety of tasks allocated to the Cyber Resiliency Exercise Enablement team.
  • Collaborate with and exert influence over all stakeholders within Eurofins ELE's, assessing recovery capabilities and delivering status reports to stakeholders.
  • Contribute to the development of processes, formulation of key performance indicators (KPIs), and the establishment of risk management protocols.
  • Leverage expertise to help forge and uphold strong relationships and trust with internal, external partners, and stakeholders/RISO's across ELE's.
  • Serve as a proficient authority in evaluating general and application controls spanning diverse technologies and platforms, employing industry practices and standards such as NIST and ISO27001.
  • Play a role in shaping the evolution of the group security Resilience program- status reports, collaborating with operational units such as the Cyber Defence, Offensive Security, Threat Intelligence, and Risk Management to gain a comprehensive understanding of potential vulnerabilities in protection or detection mechanisms.
QualysSecurity ResilienceInformation Security GovernanceEthical HackingIncident ResponseKey Performance Indicators+6

Kpmg global services (kgs)

Assistant Manager

Aug 2021Dec 2022 · 1 yr 4 mos · Bengaluru, Karnataka, India · Hybrid

  • This role is responsible for facilitating and Managing security vulnerabilities , remediation activities in infrastructure identified by SecOps / InfoSec
  • # ISO 27001 #GRC #PCI DSS #Risk Management #Compliance #NIST #ITRA #HIPPA #GDPR #ISO/IEC
  • Principal Responsibilities :
  • Drive the execution of the vulnerability management program- VCM -
  • Assist with coordinating and performing process and controls walkthroughs internally with process owners
  • Partner with Stake holders, business process owners during design, modification, or streamlining of processes and controls with a focus on controls rationalization and identifying opportunities for automation
  • Manage Compliance risk/gaps till closure. report and escalate risk to Stake holders
  • Establishes credibility and maintains strong working relationships with groups involved with information security matters (Legal, Internal Audit, Developer Community, Networking, Systems, etc.)
  • Engages with Platform & Application teams during remediation phase to help teams to remediate risks by researching and providing the suitable solutions.
  • Work closely with Global technology and business stakeholders across the firm
  • Plays a key and influential role working with others, in groups, in cross-functional settings and with diverse stakeholders internally and externally
  • Develops metrics that demonstrate the current risk state, indicators of progress, and business alignment
  • Establish regular reporting mechanisms for measuring compliance and performance of Management projects
Information Security GovernanceIncident ResponseKey Performance IndicatorsQualysThreat & Vulnerability ManagementProject Management+4

Tti, inc.

Information Technology Security Engineer

Jul 2020Aug 2021 · 1 yr 1 mo

  • Assist in development of IS security team to ensure NIST, ISO 27001 standards
  • Create policy and procedure documentation for continual security remediation efforts
  • Implement continual vulnerability management using InsightVM (Rapid7) and Security Center suite
  • Develop Digital Forensics and Incident Response capabilities of Log Rhythm SIEM
  • Perform risk-driven monitoring, reporting, and incident response for global organization
  • Perform enterprise access audits and engineer processes or system changes for continual remediation
  • Maintain EDR, antivirus, reporting, and encryption for endpoints using Crowd Strike
  • Accountabilities :
  • Identify Security risks, threats and vulnerabilities of networks, systems, applications and new technology initiatives.
  • Provide technical support in the development, testing, and operation of firewalls, intrusion detection systems, secure web/email gateways, enterprise anti-virus, and SIEM tools.
  • Enforce, and communicate security policies and procedures for data, software applications, hardware and telecommunications.
  • Monitor security events on a daily basis for suspicious activities and identify potential security threats and violations using a SIEM and other technology tools.
  • Respond to activities deemed to be improper or in violation of security policies.
  • Produce actionable threat analysis and remediation strategies in written and presentation form.
  • Execute internal and external network attack and penetration tests and application penetration testing, and vulnerability assessments. Provide recommendations for prioritization based upon existing controls.
  • Perform audits of user account provisioning for potential security threats and violations.
  • Perform highly complex product evaluations, recommend, and implement products and services for network security.
  • Ensure audit trails, system logs and other monitoring data sources are reviewed periodically and are in compliance with policies and audit requirements
Incident ResponseThreat ModelingQualysISO StandardsVulnerability Management

Mandiant (part of google cloud)

ISS Engineer

Apr 2019May 2020 · 1 yr 1 mo · Bengaluru, Karnataka

  • Conduct real-time analysis using the SIEM, FireEye technologies, and other security analytics tools with a focus on identifying security events and false positives, Further Triaging
  • Responsible for correlation and initial triage of security events and indicators generated by security monitoring tools.
  • Troubleshooting GPO related Issues Provides performance, Support system users and site level administrators, Provide capacity planning for content and storage on both on-prem and online platforms
  • Proactively inspect, analyze and contain known and unknown threats at any endpoint - (FireEye HX, EX)
  • Analyze, identify and report event based on event-logs, syslog and other sources
  • Writing complex PowerShell for maintenance, management, and automation
  • Provide capacity planning for content and storage on both on-prem and online platforms
  • Assess impact, engage tech teams and notify stakeholders for all major incidents ITIL, ITSM Framework knowledge with Incident & Problem Management
  • Perform triage and response activities related to suspected phishing emails reported to the information security team. (E-mail Security, Threat Intelligence using Internal tools )
  • Investigate and advise on potential risks and active vulnerabilities identified within the monitored network environment.
  • Define, manage and govern compliance processes (Risk, Threat, vulnerability management, adherence to mandatory security policies) working with cross-functional teams
  • Create and maintain operational reports, Perform Monthly Audits for key Performance indicators for SOC
Incident ResponseThreat ModelingISO StandardsThreat Management

Marvell semiconductor

Infrastructure Engineer

Oct 2017Mar 2019 · 1 yr 5 mos · Bangalore

  • Lead security projects to increase security posture of infrastructure and company
  • Detect, respond to, and remediate security incidents - CSIRT - Major Security incidents
  • Development and review of company-wide security policies and processes
  • Setup and maintenance of monitoring infrastructure , incident response and forensic toolkit
  • Publishing and maintaining security advisories and knowledge base articles across various Product and Application Security programs
  • Supporting the triage and remediation of code defects, quantitatively evaluate risk and provide guidance to engineering teams regarding the impact of security issues using industry standard metrics such as CVSS
  • Identify multi-layer practices for cloud covering firewall, security groups, data and resource encryption, vulnerability management.
  • Document evidences of security implementations to support during audits ( ISO/IEC 27001, Privacy, Risk Management, Data security, Business Continuity, GRC, GDPR)
Incident ResponseISO StandardsSecurity Policy Development

Capgemini

System Engineer

Dec 2014Sep 2017 · 2 yrs 9 mos · Bengaluru Area, India

  • This position Allowed me to analyse, design, configure, deploy, test, maintain and administer Citrix, VMware and related computing environments, services and all configurations.
  • Active Directory Consolidation
  • Working on deployments of Mac and Windows using SCCM and JamF
  • Usage of ITSM and ITIL frameworks to implement Change Management, Incident and Problem Management.
  • Working on windows platform Active Directory, GPO , MS Exchange, O365
  • Designing the Work Plan SCCM for Installing Windows Desktop Images on all clients
  • Provide technical assistance on Citrix products like Xend Desktop Xen App Xen Mobile to end users
  • Acts as a technical lead for implementation of new projects and ensures optimal server configurations. Creates optimal server infrastructure in support of new applications by researching and recommending hardware/software technologies in support of application requirements.
  • Effectively maintains all systems by performing maintenance patching and application upgrades (including operating system and various applications) as needed.
  • I provide Access Management Solutions, Collaboration Services
  • Maintain the front - end IT infrastructure (Workstations, Printers, Phone System, Smartphones, etc.) and ensure their reliability
ITILIT Risk ManagementIncident ResponseChaos EngineeringIT OperationsProject Management+1

Hyva it solutions pvt. ltd

Software Engineering Trainee

Apr 2014Dec 2014 · 8 mos · Bengaluru, Karnataka, India

  • The Role is responsible for supporting delivery and support of high quality Identity and Access Management services. Access Governance Identity Administration Privileged Identity Access Management & Federation Core Directory Services Security & Risk Intelligence Data Security & Loss Prevention SecurityKey Accountabilities: Working and implementation knowledge of various identity and access management products. Formulate and define business system design and/or technical system design. Responsible for gathering, compiling and synthesizing information with regard to technology processes or systems. Create test plans, technical test cases and participate in UAT.

Stackforce found 100+ more professionals with It Security Operations & Incident Response

Explore similar profiles based on matching skills and experience