Rajat Seth

DevOps Engineer

Delhi, India10 yrs 11 mos experience
Most Likely To SwitchAI ML Practitioner

Key Highlights

  • Expert in Vulnerability Management and Cloud Security.
  • Proven track record in Security Automation and Compliance.
  • Strong stakeholder engagement and technical leadership skills.
Stackforce AI infers this person is a Cyber Security expert specializing in Cloud Security and Vulnerability Management.

Contact

Skills

Core Skills

Vulnerability ManagementCloud SecurityAutomationSecurity AutomationCyber SecurityNetwork Security

Other Skills

APIAWS Certified Solutions ArchitectAWS Professional ServicesAWS SecurityAgileAnalytical SkillsApplication DevelopmentApplication SecurityArtificial Intelligence (AI)Business Intelligence and ReportingCCNACCNPCCSPCEHCISSP

About

Information Security : Cyber Security : Cloud Security : Network Security : Data Security : Application Security : Automation : Business Intelligence : Vulnerability Management : Security Assessment : Qualys : Nesses : Tenable : AppThority : OneTrust : DigiCert : Flexera : Power BI : Python : Agile : Firewall : Proxy : DLP : VPN : Skybox : API : IPS : IDS

Experience

Servicenow

Staff Information Security Engineer (Cloud : Vulnerability : Compliance : Configuration :Automation)

Mar 2023Present · 3 yrs · Hyderabad, Telangana, India · Hybrid

  •  Vulnerability Management: Utilizing Tenable to perform scans, initiate remediation efforts, and automate scan and security processes.
  •  Configuration Management: Ensuring systems are securely configured and compliant with policies.
  •  Reporting: Building detailed reports using Power BI.
  •  Stakeholder Management: Engaging with stakeholders, senior management, remediators, and end users to ensure effective communication and resolution of security issues.
  •  Technical Leadership: Leading technical initiatives and managing a team to enhance security measures and compliance.
Vulnerability ManagementConfiguration ManagementReportingStakeholder ManagementTechnical LeadershipCloud Security

Amazon web services (aws)

Cloud Security Specialist (Consultant) (Security : Risk : Compliance : Automation)

Nov 2021Mar 2023 · 1 yr 4 mos · Hyderabad, Telangana, India · Hybrid

  •  AWS Professional Services: Provided security consulting to AWS customers, guiding them on migrating to AWS, integrating their infrastructure with AWS, and securing their infrastructure.
  •  Automation: Automated infrastructure creation processes using Terraform and custom-built tools with Python.
  •  Security Consulting: Offered expert advice on best practices for cloud security, compliance, and risk management.
  •  Custom Solutions: Developed custom tools and solutions to meet specific customer needs, enhancing their security posture.
  •  Stakeholder Engagement: Worked closely with customers, understanding their requirements, and providing tailored solutions to ensure their cloud environments were secure and efficient.
  •  AWS Services: AWS Secrets Manager, AWS Certificate Manager, AWS CloudHSM (hardware security module), AWS Key Management Service (KMS), Amazon Macie, AWS Single Sign-On (SSO), Amazon Cognito, AWS Resource Access Manager, AWS Directory Service, AWS Identity and Access Management (IAM), AWS Firewall Manager, AWS Web Application Firewall (WAF), AWS Shield, AWS CloudTrail, Amazon Inspector, AWS Security Hub, AWS Config, Amazon GuardDuty, AWS IoT Device Defender, AWS Artifact, CloudWatch, Amazon EventBridge, CloudFormation, Lambda, Simple Notification Service, Config
AWS Professional ServicesAutomationSecurity ConsultingCustom SolutionsStakeholder EngagementCloud Security

Citrix

Sr. Security Engineer (Cyber : Cloud : Automation)

Feb 2020Nov 2021 · 1 yr 9 mos · Bengaluru, Karnataka, India · Hybrid

  • o Vulnerability Management
  •  Work on multiple Vulnerability Management tools like Qualys, Tenable, Nessus.
  •  Configure and Schedule the vulnerability scan on the different types of assets like Workstations, Servers, Databases, Web Applications, Network Devices, Cloud Asses, etc.
  •  Generate the Vulnerability Report, Prioritize the Vulnerabilities, share it with the respective Team, and help them to fix their vulnerabilities.
  •  Troubleshoot and fix the Scan and Agent related issues.
  • o Compliance Assessment
  •  Perform the Compliance Assessment of On-Prem and Cloud Assets.
  •  Using different Compliance Assessment tools like Qualys Policy Compliance, Qualys PCI Compliance, Cloud Custodian, OneTrust to perform the assessment.
  •  Perform Assessment against well-known Compliance Frameworks like ISO, CIS, NIST, CMMC, COBIT, etc.
  • o Security Automation
  •  Automate the Vulnerability Scan Process.
  •  Automate the Compliance Scan Process.
  •  Automate the Cloud Scan Process (AWS, Azure, & GCP).
  •  Automate the Risk Prioritization Process.
  •  Automate the Reporting Process.
  •  Using core python and API to automate the stuff.
  •  Collect data from the different data sources and create a Unified Risk System.
  •  Automate the Alerts & Notification of Security incidents and sending them to different tools like Outlook, Team, Slack, Splunk, Mobile, etc to perform quick action.
  • o Business Intelligence and Reporting
  •  Perform different types of analysis like Prediction Analysis, Ageing Analysis, SLA Analysis, Performance Analysis, etc.
  •  Create different types of Dashboards like Live Security Dashboard, Historical Security Dashboard, Incident Status Dashboard, etc.
  •  Create different types of Reports for Higher Management.
  •  Analyze and Integrate the data from different types of Data Sources like Security Tools, Collaboration Tools, Ticketing Tools, Databases, etc.
  •  Schedule the report to keep the data up to date.
  •  Perform ETL process on data and create models to improve the performance.
Vulnerability ManagementCompliance AssessmentSecurity AutomationBusiness Intelligence and Reporting

Deloitte

Sr. Cyber Security Consultant

Nov 2017Feb 2020 · 2 yrs 3 mos · Gurugram, Haryana, India · On-site

  • o Security Risk Review
  •  Performed the Security Risk Assessment of Change Management Ticket.
  •  Followed the company Policy and Guidelines to perform the Security Risk Assessment.
  •  If change violated the company policy, followed the Risk Management Process (Risk Mitigation, Exception, TSR, etc.)
  •  Analyzed End to End traffic based on user's change request.
  •  Used multiple security tools during this process like Virus Total, SSL Labs, Checkpoint & Paloalto Traffic Categorization, etc.
  • o Vulnerability Management
  •  Worked on multiple Vulnerability Management tools like Qualys, Tenable, Nessus, Flexera, AppThority, Expender, AirWatch, Skybox, Expanse, Aqua, Blackduck.
  •  Configured and Scheduled the vulnerability scan on the different types of assets like Workstations, Servers, Databases, Web Applications, Network Devices, Cloud Asses, etc.
  •  Generated the Vulnerability Reports, Prioritized the Vulnerabilities, share them with the respective Team, and helped them to fix their vulnerabilities.
  •  Troubleshoot and fix the Scan and Agent related issues.
  • o Penetration Testing
  •  Performed the Penetration Testing of Web Applications.
  •  Manual and Automated Penetration Testing.
  •  Used different types of Penetration Tools like Burp, Web Inspect, etc.
  •  Generated Report and shared with Owner / Client.
  • o Firewall Assessment
  •  Performed the Assessment of Next Gen Firewalls like Checkpoint, Palo Alto.
  •  Assessed the Inactive Rules, Violated Rules, Risky Protocol Rules, Allowed All Rules, etc.
  •  Generate the Report, share it with the respective Team, and help them to fix it.
  • o Security Automation
  •  Automate the Vulnerability Scan Process.
  •  Automate the Cloud Scan Process (AWS, Azure, & GCP).
  •  Automate the perimeter scanning & Internal/External domain identification using Expander.
Security Risk ReviewVulnerability ManagementPenetration TestingFirewall AssessmentSecurity AutomationCyber Security

Innodata inc.

Sr. Network Security Engineer

May 2015Nov 2017 · 2 yrs 6 mos · Noida, Uttar Pradesh, India · On-site

  • o Network Security Operation
  •  Worked on many Network Security Devices like Firewall (Checkpoint Fortigate, Palo Alto, Cisco), Proxy (Websense and Bluecoat), SIEM, IPS/IDS, Honeypots, Load Balancer, VPN, DLP.
  •  Worked on Routers, Switches, and their troubleshooting.
  •  Harden the Network Devices.
  •  Worked on Network Protocols like HTTP, TCP, SSL, DNS, DHCP.
  •  Installed, Upgraded, Maintained, Troubleshoot, and Monitored the Multi-Vendor Firewall.
  •  Worked with Auditor to perform the audit of Network devices.
  • o Secure Network Architecture
  •  Designed and Implemented the Security part of the new Datacenter.
  • o On-Prem to Cloud Migration
  •  Certified Cloud Solution Architect with full exposer of Cloud Architecting, Operation, Monitoring, Security, Automation (CI/CD) & Compliance.
  •  Performed the Migration of On-Prem Data Center to Cloud Data Center.
  • o Security Operation Center
  •  Worked on multiple Network Traffic Monitor tools like Wireshark, Burp Suite, TCP Dump.
  •  Worked in the Global Support team so I can easily manage the shift, timing, people, team, priority task, meetings, client, vendors.
  •  Monitor and log security concerns and incidents, and generate reports, and track performance.
Network Security OperationSecure Network ArchitectureOn-Prem to Cloud MigrationSecurity Operation CenterNetwork SecurityCloud Security

Panasonic

Cloud Security Intern

Jun 2014Jul 2014 · 1 mo · Noida, Uttar Pradesh, India · On-site

Education

UNITED COLLEGE OF ENGINEERING AND RESEARCH, GREATER NOIDA

Bachelor of Technology (B.Tech) — Electronics and Communications Engineering

Jan 2011Jan 2015

Stackforce found 100+ more professionals with Vulnerability Management & Cloud Security

Explore similar profiles based on matching skills and experience