S

Sagar C.

CTO

Bengaluru, Karnataka, India18 yrs 3 mos experience
Most Likely To SwitchHighly Stable

Key Highlights

  • 19 years of experience in security architecture.
  • Expert in EDR/XDR platforms and threat intelligence.
  • Proven track record in leading cross-functional security teams.
Stackforce AI infers this person is a Cybersecurity Architect specializing in EDR/XDR solutions and security frameworks.

Contact

Skills

Core Skills

Security ArchitectureThreat IntelligenceCyber Threat Intelligence (cti)EdrSecure Software Development Lifecycle (ssdlc)Penetration TestingSecure SdlcProduct Security ConsultingSecurity Design RequirementsSecurity Architecture FrameworkApplication SecuritySecurity Code Reviews

Other Skills

XDRNDRRed TeamingMITRE ATT&CKInformation Security Management System (ISMS)Threat ModelingSSDLCVulnerability ResearchAdversary EmulationRisk AssessmentMedical Device SecuritySecurity PoliciesSecurity DesignSecurity Components DesignVulnerability Assessment

About

Experienced security leader, architect, and engineer with over 19 years of proven expertise in designing and implementing comprehensive security solutions. Adept at driving organizational security strategies across diverse sectors, including software, endpoint, medical device, and product security. Demonstrated success in leading cross-functional teams, securing critical infrastructure, and delivering robust security architectures that align with business objectives.

Experience

18 yrs 3 mos
Total Experience
3 yrs
Average Tenure
4 yrs 4 mos
Current Experience

Trellix

3 roles

Distinguished Engineer

Promoted

Dec 2025Present · 4 mos · Bengaluru, Karnataka, India · On-site

  • Define and own the long-term technical vision and security architecture for EDR/XDR platforms, ensuring scalable and adversary-resilient detection.
  • Serve as the highest technical authority on detection efficacy, establishing organization-wide standards for ATT&CK coverage, accuracy, and false-positive reduction.
  • Lead product-level security architecture design, guiding major platform and system-level decisions across endpoint, cloud, identity, and data pipelines.
  • Drive adversary-led strategy by translating real-world attacker behavior and threat intelligence into product architecture and roadmap direction.
  • Architect and govern continuous adversary emulation and purple-team programs to measure, benchmark, and improve detection effectiveness.
  • Own and evolve secure SDLC strategy, embedding threat modeling, secure design reviews, and security validation across the product lifecycle.
  • Establish security architecture and SDLC governance frameworks to ensure consistent, auditable, and scalable security practices across teams.
  • Provide cross-organizational architectural oversight, resolving complex security design tradeoffs and managing architectural risk.
  • Influence executive, product, and engineering leadership on security risk, architecture decisions, and long-term technical investments.
  • Mentor principal engineers, architects, and researchers, raising the technical bar and developing future technical leaders.
EDRXDRSecurity ArchitectureThreat IntelligenceSecure SDLC

Senior Security Architect - Efficacy & Research

Apr 2024Dec 2025 · 1 yr 8 mos · Bengaluru, Karnataka, India · On-site

  • Evaluate and enhance the detection capabilities of EDR/XDR products.
  • Improve threat detection through simulated attacks, threat intelligence feeds, and real-world scenarios.
  • Design and develop adversary emulation plans.
  • Design and develop adversary emulation infrastructure and tools.
  • Analyse detection rules, signatures, and behavioral analytics within EDR/XDR platforms to improve their detection accuracy and reduce false positives/negatives.
  • Optimize the performance of EDR/XDR tools, ensuring they provide timely and accurate threat detection without impacting system performance.
  • Conduct in-depth research on emerging threats, attack techniques, and vulnerabilities.
  • Collaborate with threat intelligence teams to incorporate the latest threat data into product development and research efforts.
  • Design and execute MITRE ATT&CK-based adversary emulation exercises to test the effectiveness of EDR/XDR products.
  • Identify gaps in detection coverage by comparing the EDR/XDR performance against MITRE ATT&CK techniques.
  • Align EDR/XDR capabilities with the evolving MITRE ATT&CK framework, incorporating new techniques and tactics as they emerge.
  • Lead and coordinate purple team exercises that bring together red (offensive) and blue (defensive) teams to collaboratively test and improve security defenses.
  • Lead a team of security researchers, analysts, and engineers. Set research agendas, assign tasks, and ensure high-quality outputs from the team.
  • Provide guidance and mentorship to security researchers, architects, threat hunters and developers.
  • Collaborate with product management, development teams, threat intelligence, and customer-facing teams to ensure alignment across all aspects of the security product lifecycle.
NDRRed TeamingCyber Threat Intelligence (CTI)MITRE ATT&CKEDR

Senior Security Architect

Nov 2021Mar 2024 · 2 yrs 4 mos · Bengaluru, Karnataka, India · On-site

  • Contribute to Product Security Policy, Standards, and Guidelines .
  • Implement Secure Software Development Lifecycle (SSDLC) practices across Trellix.
  • Evaluate and operationalize new technologies for securing the Trellix products.
  • Provide SME expertise throughout Trellix Engineering and Product Teams on SSDLC.
  • Lead in-depth architecture,design,code and product reviews to identify vulnerabilities.
  • Build Threat Models and execute Risk Assessments,provide effective countermeasures.
  • Perform product security design and code review,guide with integration of DevSecOps.
  • Assess the security of complex cloud stacks.
  • Designing and building security tools, scripts integrated with the CI/CD pipeline.
  • Implement security automation where possible.
  • Lead and Guide Penetration Testing efforts across Trellix.
  • Build Fuzzing at Scale for process,services & protocol fuzzing.
  • Develop Adversary Emulation Tools for better XDR & EDR efficacy.
  • Educate organization on Threats,Risks and Importance of Security in Trellix products.
  • Mentor security architects, engineers and help improve product team tradecraft, techniques, and tooling.
  • Create world class security training & course contents for experienced security engineers.
Information Security Management System (ISMS)Secure Software Development Lifecycle (SSDLC)Threat ModelingPenetration Testing

Mcafee

Security Architect

Jan 2020Nov 2021 · 1 yr 10 mos · Bengaluru Area, India

  • Responsibilities:
  • Secure SDLC
  • Security Architecture and Design
  • Threat Modeling
  • Risk Assessment
  • Vulnerability Research
  • Coverage Guided Fuzzing
  • Penetration Testing
  • Security Code Reviews
  • MITRE ATT&CK Framework Emulation
  • Research and Analysis of TTPs
  • Red Teaming
  • Develop Adversary Emulation Tools
Secure SDLCThreat ModelingVulnerability ResearchPenetration Testing

Tüv süd

Senior Security Consultant

Sep 2019Dec 2019 · 3 mos · Munich Area, Germany · On-site

  • Product Security Consulting
  • Medical Device Security Consulting
  • Penetration Testing:
  • IoT
  • Mobile
  • Medical Devices
  • IT Infrastructure
  • Web Application and Services
  • Lock Systems and Management Applications
  • Cloud
  • Wireless
  • ICS
  • Security Code Reviews
  • Risk Assessment
  • Threat Modeling
  • Develop Medical Devices and software cyber security framework as per FDA, GDPR, HIPAA, UL2900, MDR, DoD, NIST etc.
  • IoTSF - IoT Security Compliance
Product Security ConsultingPenetration TestingRisk Assessment

Beckman coulter

Cyber Security Engineer - R&D

Sep 2016Jan 2019 · 2 yrs 4 mos · Bengaluru Area, India

  • Develop product privacy and security design requirements in line with GDPR, NIST, SANS, OWASP & HIPAA.
  • Lead, design & build security strategy, technology roadmaps.
  • Lead, design, and establish security policies, checklist for DevOps (AWS).
  • Author product security and privacy policy.
  • Create Windows Firewall, Application Control, Secure Coding, Database, Disk Encryption, Web Server, and Hardening (CIS) guides for OpCos.
  • Establish framework to manage security risks across SDLC.
  • Design and Architecture analysis of >30 diagnostic instruments, products and networks.
  • Introduce Coordinated Vulnerability Disclosure Framework (CVD).
  • Write Product privacy & security policy gap analysis playbook.
  • Pen testing, vulnerability and risk assessment of diagnostic instruments, products, embedded devices, networks and cloud services.
  • Fortify on Demand (SaaS) security code reviews.
  • Threat Detection, Response & Deception: Deploy and manage GuardiCore in SaaS mode.
  • Implement DigiCert PKI.
  • Provide Security SME inputs to Danaher’s 8 OpCos.
  • SaaS based network vulnerability analysis using Nessus.
  • Execute red team exercises on Cloud, Products and Applications.
  • Develop and deliver security modules, PoCs, work instructions to Security Council.
  • Review & address customer concerns on security incidents.
Security Design RequirementsSecurity PoliciesRisk Assessment

Philips

Senior Product Security Engineer

Jun 2011Sep 2016 · 5 yrs 3 mos · Bengaluru Area, India

  • Design, develop & deploy security components as per industry standard security (NIST) & privacy requirements (HIPAA) for Philips CT, AMI Products & Services.
  • Write system & sub-system security requirements.
  • Design, develop and deploy security modules for CT and AMI products.
  • Develop proof of concepts to introduce new security features.
  • Develop security architecture framework, roadmaps and strategies.
  • Create & manage PKI infrastructure to support software signing.
  • Study product security issues; integration issues; provide solutions.
  • Guide Security Council to achieve policy and guidance clarity.
  • DIACAP assessment of Philips CT, AMI products for DOD.
  • Pen testing, vulnerability & risk assessment of CT, AMI & PACS.
  • Deploy, configure McAfee Application Control & Anti-Virus.
  • Establish and integrate Fortify SCR into the build process.
  • Provide Security SME inputs to 3 other business units of Philips.
  • Delivered security roadmaps and guidance to 11 CT and AMI products.
  • Initiated and completed 3 CAPA process for security field incidents.
  • Analysed 18,000+ CT/AMI products for McAfee Anti-Virus incompatibility incident.
  • Complete Medical Device Security (MDS2) forms.
  • Execute tool validation process to incorporate security tools for product use.
Security Components DesignSecurity Architecture FrameworkRisk Assessment

Aol

Technical Security Engineer

Sep 2010May 2011 · 8 mos · Bengaluru Area, India

  • Application & Network architecture design reviews.
  • Pen testing, vulnerability & risk assessment of AOL applications.
  • Exploit development, vulnerability exploit & impact analysis.
  • Publish security articles on office blogs & wiki.
  • Develop IT Security guidelines.
  • PKI Assessments, PCI Assessments and CMS Assessments.
Application SecurityPenetration TestingVulnerability Assessment

Accenture

Senior Security Engineer

Jul 2006May 2010 · 3 yrs 10 mos · Bengaluru Area, India

  • Security code reviews as per OWASP Standards & Industry best practices.
  • Pen testing, vulnerability & risk assessment on client products & applications.
  • Conduct security assessments of internal systems and applications as part of the overall risk
  • management practice of the organization.
  • Develop pen testing pre-engagement questionnaire & process.
  • Execute PCI & HIPAA Assessments.
Security Code ReviewsVulnerability AssessmentPenetration Testing

Education

University Vishweshwaraya College of Engineering

Bachelor's degree — Computer Science and Engineering

Jan 2002Jan 2006

Stackforce found 100+ more professionals with Security Architecture & Threat Intelligence

Explore similar profiles based on matching skills and experience