Sam Varun

CTO

Chennai, Tamil Nadu, India13 yrs 4 mos experience
Highly Stable

Key Highlights

  • Over 14 years of cybersecurity management experience.
  • Expert in incident response and threat hunting.
  • Proven track record in developing security operations centers.
Stackforce AI infers this person is a Cybersecurity expert with extensive experience in incident response and security operations management.

Contact

Skills

Core Skills

Incident ResponseSecurity Operations ManagementDigital ForensicsMalware AnalysisSecurity Research

Other Skills

Client reportingCloud SecurityCyber Threat Hunting (CTH)Cyber resilience frameworksDFIRExecutive-level reportingHost forensicsInformation SecurityKPI developmentLog analysisMalware triageNetwork SecurityNetwork forensicsQuality assuranceRed Teaming

About

I'm an Information Security Manager with over 14 years of experience. Throughout my career, I've successfully implemented and managed cybersecurity operations centers, specializing in incident response, threat hunting, breach investigations, digital forensics, and malware analysis. Professional Certifications:Certified Information Security Manger (CISM) - #2052109GIAC Certified Incident Handler (GCIH) - #37087

Experience

Google

Staff Security Engineering manager

Jun 2025Present · 9 mos

Linkedin

Manager, Information Security

Oct 2024Jun 2025 · 8 mos · Greater Bengaluru Area · On-site

Microsoft

Senior Security Engineering Manager

Nov 2020Nov 2024 · 4 yrs · On-site

  • Managed Tier-3 SOC (Threat hunting and Major/critical incident investigation), Digital forensics and Incident response teams for Microsoft In-house security operations center.
  • Increased operational security by making critical security decisions and overseeing a team of cyber experts across the organization to effectively address cyber incidents.
  • Developed & enhanced the integrated Security Operations Centre for advanced cyber threat monitoring by implementing cyber resilience frameworks, standard operating procedures.
  • Experienced in preparing executive-level reports and presentations, summarizing key findings, incident response actions, and recommendations.
  • Investigate and manage major cyber security incidents and breaches.
  • Track and perform threat hunting on emerging and advanced persistent threats.
  • Build metrics and KPI for daily operations and for projects focused on Microsoft security tools.
  • Fostered a healthy and inclusive team environment and Served as a mentor, coach, and facilitator.
Threat huntingDigital forensicsIncident responseCyber resilience frameworksExecutive-level reportingKPI development+2

The world bank

2 roles

Information Security Analyst

Apr 2019Nov 2020 · 1 yr 7 mos

Senior Security Analyst

Aug 2017Apr 2019 · 1 yr 8 mos

  • As the Senior Security Analyst of the 24/7 SOC, I assist in the continuous monitoring of alerts from multiple security tools.
  • Conduct host forensics, network forensics, log analysis, and malware triage in support of incident response investigations
  • Perform Analysis on suspicious samples & submit to AV Vendor for detection.
  • Perform analysis on threats, exploited URLs, network packets for malicious URL indicators & submit for blocks.
  • Perform analysis of attack activities such as network reconnaissance probing/scanning, DDOS, malicious code activity.
  • Perform and create detailed Malware analysis reports and early warning indicator reports.
  • Manage and maintain SIEM solution to include developing and monitoring content to support Security Operations analysis.
  • Perform Triage and analyze incidents in real-time using security controls and SIEM.
  • Identification of security incidents and perform containment, remediation by live response.
  • Conducted Red team exercise to identify full impact of a compromise.
Host forensicsNetwork forensicsLog analysisMalware triageSIEM managementIncident Response+1

Sutherland

Team Lead (Mcafee Avert Labs)

Nov 2012Aug 2017 · 4 yrs 9 mos · Chennai Area, India

  • As the security researcher of Mcafee AV, I have analyzed suspicious files submitted by the users to identify the sample is a malware or clean file, once determined as malware. Malware definitions will be created for the users.
  • Virus Information Library and a detailed malware analysis report will be created for the malware as per the user’s requirement.
  • Perform Analysis on webpages to identify facets (Downloads, Phishing, Exploits, Links to malicious sites, etc) and reports will be added to Mcafee threat database.
  • Providing feedback and motivating team members to achieve SLA and quality while analyzing malware.
  • Created SOP & Handbook which streamlined the process, this helped us to acquire new process of Malware Database collection
  • Performing QA Audits to make sure the team adheres to the process and quality is achieved.
  • Providing prompt and accurate information on individual performance.
  • Coordinate with clients and generate Ad hoc reports and excel dashboards as per their requirement.
  • Arranging & chairing weekly team meetings, focusing on targets & achievements.
  • Implementing new initiatives. Attending scrum calls to make sure that all the information is shared across the zones.
Malware analysisQuality assuranceClient reportingMalware AnalysisSecurity Research

Education

University of Madras

Bachelor of Science - BS

Stackforce found 100+ more professionals with Incident Response & Security Operations Management

Explore similar profiles based on matching skills and experience