Kamaiah Nadavala

CEO

Bengaluru, Karnataka, India19 yrs 7 mos experience
Highly Stable

Key Highlights

  • 19 years of experience in information security leadership.
  • Expert in developing comprehensive security strategies.
  • Proven track record in risk management and compliance.
Stackforce AI infers this person is a seasoned cybersecurity leader with expertise in Fintech and E-commerce security frameworks.

Contact

Skills

Core Skills

Information Security ManagementRisk ManagementInformation Security GovernanceCompliance GovernanceApplication SecurityVulnerability ManagementSoftware DevelopmentInformation Technology

Other Skills

AWS SecurityApplication Security ArchitectureBusiness Continuity Management System (BCMS)Cloud SecurityCompliance ManagementCompliance MonitoringCybersecurityCybersecurity PoliciesData SecurityDevSecOpsGeneral Data Protection Regulation (GDPR)ISO 27001Information Security Management System (ISMS)Information Security PoliciesInfrastructure Security

About

As a high-impact and influential Information Technology Leader with over 19 years of rich and vast experience, I am equipped with advanced and successive technical and operational expertise in product and application security, as well as information security principles, principles, and practices. As a result of my work with Cloud-based, On-Premises, and Desktop solutions, I have been recognized for bringing in the evolution of security architecture and solutions. Having a strong understanding of cryptography and security vulnerabilities, risk, and remediation, I have successfully applied these skills to authentication and authorization. As a professional IT auditor (ISO), I have an indelible reputation for being a solid expert in network architectures and protocols, operating systems, and core infrastructure security concepts. With an entrepreneurial mindset, I build and lead a team of application security professionals that fosters a sense of teamwork, urgency, and engagement. With a pragmatic approach, I empower the application security testing suite (as VPNs, firewalls, email security, and cloud security) and improve product security to reduce vulnerabilities introduced into enterprise production environments. Besides developing frameworks for addressing potentially harmful threats, service interruptions, and unplanned events, I also manage incidents and restore processes back to normal. My role is to become the leader of the company's cyber data vision and roadmap and adoption of security best practices. I am also responsible for reusing, buying, and building capabilities while developing metrics that map and communicate the health and risk of the company's cyber capabilities. Moreover, I adhere to and promote information security standards, conduct security risk assessments, testing, and vulnerability assessments, and guide stakeholders on risk remediation. The success I have achieved has made me bold, however, working with large teams to accomplish difficult projects and ideas has also humbled me. I am also proud of how I pivoted underperforming initiatives effectively and learned from them. Ace in communication skills which have transformed me into a high-caliber professional who can resourcefully deal with key stakeholders. Infused with an innate ability to forge strong connections, can be easily contacted on LinkedIn or on by email: kamaiah.nadavala@gmail.com

Experience

Upstox

CISO at Upstox

Feb 2023Present · 3 yrs 1 mo · Bengaluru, Karnataka, India · On-site

  • I developed and implemented a comprehensive information security strategy aligned with our business objectives. This included establishing robust cybersecurity policies, standards, and frameworks, and instituting risk management practices that safeguarded our trading platforms and financial data. I ensured compliance with SEBI, NSE, BSE, and other regulatory requirements by monitoring and reporting our security posture and emerging risks to senior management for informed decision-making.
  • My responsibilities included overseeing cybersecurity audits, penetration testing, and compliance assessments, as well as implementing data protection and privacy policies to secure customer information. I managed our Security Operations Center (SOC) to monitor and respond to threats, deploying intrusion detection and prevention systems and endpoint security measures.
  • I developed and tested incident response plans for cyber threats and implemented fraud detection systems to mitigate insider trading and identity theft risks. I fortified trading platforms against DDoS attacks, phishing, and malware, enforced identity and access management controls, and assessed risks associated with third-party vendors and cloud providers. I also established cybersecurity SLAs, conducted regular training to foster security awareness, developed disaster recovery plans, and adopted AI-driven threat detection to stay ahead of cyber threats.
Business Continuity Management System (BCMS)Privacy Information Management SystemInformation Security Management System (ISMS)Information Security ManagementRisk Management

Flipkart

2 roles

Flipkart | Associate Director & Information Security (BISO)

Apr 2020Mar 2023 · 2 yrs 11 mos

  • At present, I am a Business Information Security Officer for Flipkart Health Plus as well as the Head of Security Assurance, Application, and Network Security for Flipkart Group companies, where I ensure a 360o view of the entire security charter for the company. Sastasundar, acquired by Flipkart and rebranded Flipkart Health Plus, is managed by me and I organize regular meetings with senior management as well as other stakeholders.
  • In my role as a senior information security leader at Flipkart, I implement information security policies, procedures, and standards across their business; elevating the NIST score from 2.03 to 3.5. In the areas of cyber health and intelligence, I facilitate and enable support to business growth initiatives, including marketing engagements, proposals, and short-term program support.
  • Additionally, I oversee all Flipkart security processes to support business objectives; work with CIS and groups to ensure documentation is complete and engineering quality is high.
  • I also served as the Service Point of Contact (SPOC) for Flipkart Health Plus' business, leadership, engineering, product, IT, HR, Finance, and Legal teams; managed Flipkart Health Plus' security policies and standards.
  • Through my skills, I identify non-compliances in IT security, and areas for improvement, develop and implement remediation measures; develop an understanding of business processes, systems, technologies, data, and customers; and facilitate reformatting implementation.
Privacy Information Management SystemInformation Security Management System (ISMS)Information Security GovernanceRisk Management

Head of Security Assurance, Application, and Network Security

Apr 2020Mar 2023 · 2 yrs 11 mos

  • My role encompasses risk management, compliance and governance, information security assurance, and third-party information security risks. Maintaining and implementing the Information Security roadmap and building long-term relationships with key stakeholders is my key responsibility.
  • As a result of the skills gained, I ensured the Information Security transformation by maintaining a high standard of controls and ensuring they were implemented as required.
  • Moreover, I contributed to the implementation of industry standards and best practices as part of an integrated security approach.
  • Working with risk owners to develop & implement treatment plans, I identify and manage information security risks throughout the organization.
Privacy Information Management SystemInformation Security Management System (ISMS)Risk ManagementCompliance Governance

Envestnet | yodlee india

5 roles

Senior Manager Application and Prodcut Security

Feb 2019Apr 2020 · 1 yr 2 mos

  • As part of this role, I mapped security vulnerabilities, threats, and events. Using STRIDE and Cyber Kill Chain frameworks, I have contributed to security architectural reviews and drafted use cases for infrastructure security, DevSecOps, AWS, and application security.
General Data Protection Regulation (GDPR)SOC 2Application SecurityVulnerability Management

Manager Application and Product Security

Promoted

Feb 2016Jan 2019 · 2 yrs 11 mos

  • To influence decision-making processes across all levels, I devised an application security strategy and used a risk management approach instead of a purely academic one.
  • Through the skills gained, I was able to respond to all major incidents, as well as formulate metrics reporting, while deploying all the new and existing security tools, standards, and processes concerned with static analysis as well as runtime testing.
  • Essentially, I was responsible for informing the organization of areas of non-compliance/gaps that needed to be rectified in an Agile and DevOps environment in order to meet all applicable security requirements, including PCI-DSS, HIPPA, and another state regulatory or industry standards
General Data Protection Regulation (GDPR)SOC 2Application SecurityRisk Management

Lead Application and Product Security

Jul 2014Feb 2016 · 1 yr 7 mos

  • My responsibilities included auditing PCI certifications, leading 3rd party penetration tests, and reviewing security architectures on time. Utilizing the skills gained, I participated in security testing efforts against applications, including code reviews, black/white box testing, and maintaining a continuous testing process.

Sr.Application and Product Security Engineer

Jul 2013Jul 2014 · 1 yr

  • By evaluating proprietary security tools that fit the Yodlee products, I performed security assessments for Yodlee products (Yodlee web & mobile architectures).
  • By using the skills I gained, I reviewed and tested security source code for in-house products/applications, including web apps, iPhone/iPad apps, & Android apps; I also reviewed Java, J2EE, C/C, and Objective-C apps.
  • Furthermore, I developed Java, J2EE, and Flex tools for public and private internal use, and conducted white box and black box penetration tests on high-profile web, mobile, desktop, and server applications.
  • Meanwhile, I conducted penetration testing on the web, iPhone/iPad, and Android applications while attending yearly security audits. It would be fair to say that my work on the HP Fortify SCA tool consisted of developing custom rules and integrating them into various build tools for both web and mobile products and apps.

Application and Product Security Engineer

Jun 2012Jul 2013 · 1 yr 1 mo

  • My responsibilities in this role included planning and assessing the security of internal web, iPhone/iPad, and Android applications. Aside from the testing high-profile web, mobile, desktop, and server applications, I also reviewed Java, J2EE, C/CMM, and Objective-C code.

Mphasis an hp company

Delivery Software Engineer

Apr 2010Jun 2012 · 2 yrs 2 mos · Bangalore

  • Develop an end to end of web applications using java/j2ee technologies and javascript source code review of other team members.
  • Conducted penetration testing on Chase insurance application (Chase Insurance) and in-house developed applications and production systems. Assisted in a resolution of exposed security weaknesses.
  • White and black box penetration testing of a wide variety of high-profile web applications and server software.
  • Security architecture review of production infrastructure and software.

Tata consultancy services

2 roles

IT Analyst

Jul 2009Apr 2010 · 9 mos

  • Understand the system requirements document and design and code.
  • Involved in designing, coding and bug fixing of the EMC Celerra Manager product (NAS).
  • Involved in analyzing the existing code and design, class diagrams and sequence diagrams.
  • Implementation of new features in the Celerra Manager GUI.
  • Analyze and develop the solution for problems reported in EMC’s Storage products.
  • Adding new features for the existing Celerra Manager, to support the latest storage concepts and customer demands
  • Involved in fixing the real-time issues after post-production in warranty period.
  • Code to the application functionality.
  • Involved in the production deployment for quarterly releases, major bug fixes and enhancements.
Information TechnologyJavaSoftware DevelopmentSDLC

Software Engineer

Aug 2006Jul 2009 · 2 yrs 11 mos

  • Understanding requirements of the client (Target-MIB and OTM) through Detailed Use Cases (DUC’s).
  • Creating, writing blue prints and Technical design documents (Utility Framework)
  • Development and support of ATG Framework Code
  • Generation of Sequence diagrams and class diagrams using Rational XDE.
  • Developing UI and server side by using JSP’s, servlets, Java Script and HTML.
  • Involved in Integration and testing of the code written by other team members.
  • Analyze and develop solutions for problems reported in Target’s MIB Application and OTM Application.
  • Developed Complex Reports Using Web Focus Reporting Tool and embedded into MIB application and OTM application to access through GUI.
  • Involved in trouble shooting performance issues with Web Focus Reporting tool.
Information TechnologyJavaSoftware DevelopmentSDLC

Education

Acharya Institute Of Management and Science

MCA — Master of Computer Apllications

Jan 2003Jan 2006

Stackforce found 100+ more professionals with Information Security Management & Risk Management

Explore similar profiles based on matching skills and experience