Badges
User Activity
Answers
About me
• Used Qualys-Guard Vulnerability Management tool to perform Vulnerability Management & Assessment (External and Internal scanning)
• Provided technical leadership to the enterprise for information security-compliance program
• Analyzed and discussed Security Compliance reports with various business unit and helped them remediate all non-compliant controls periodically
• Using automated log-mgmt tool Log-Logic performed security log review and analysis
• Correlated activities across different logs to perform comprehensive log-analysis
• Developed Security Metrics for Executive Mgmt covering Control Assurance and Vulnerability Assessment
• Worked with Internal and External auditors on ISO 27001 certification audit process
• Performed real-time Network Security Monitoring and Incident Response
• Monitored host and network traffic for signs of subsequent compromise or exploitation
• Developed customized Event Correlation rules for security monitoring
• Performed SOX (Sarbanes-Oxley) compliance testing to validate the existence of controls
• Performed extensive technical analysis of several different wireless security tools for WLAN IDS (Intrusion Detection System) and IPS (Intrusion Prevention System)
Solution
• Configured several Cisco Wireless Access Points and Cisco 350 Wireless Clients in accordance with the Information Security Standards.
• Designed and implemented Wireless LAN infrastructure.
• Performed site surveys using to evaluate wireless signal strengths and to compute the appropriate wireless channels and locations to be used for WLAN
• Issued X.509 Digital certificates for client-side SSL authentication to Extranet (B2B portal) website using Entrust Technologies.
• Provided second and third level support for PKI Infrastructure including PKI application support and trouble-shooting Digital Certificate clients.
• Developed PKI support procedures and guidelines
• Designed and implemented Wireless LAN infrastructure