- Enterprise Security Strategy and Roadmaps
- Information Security Management System development
- Corporate information security program development
- Incident response program development
- Security awareness program development
- Vendor management program development
- Merger and acquisition IT controls diligence
- Enterprise Architecture Review Board
- Enterprise security standards development
- BCP/DR Business impact analysis
|
- Compliance Gap analysis & readiness assessments
- Information Governance Program
- Cloud Governance & Compliance strategies
- Policy, process and standards development
- Specializing in PCI-DSS compliance
- ISO27001/27002 security framework deployment
- Sarbanes-Oxley, COBIT 4 controls development
- HIPAA Compliance
- GLBA Compliance
- California Consumer Protection Act Compliance
|
- Hyper converged virtualized infrastructure design - VMWare ESX, NSX, VBlock ZEN
- Intrustion prevention/detection network tap design - McAfee, Cisco Firepower/Sourcefire
- Advanced IPV4/IPV6 Firewall design - PaloAlto, Checkpoint, Cisco
- Enterprise mobility management - MDM, MCM, MAM Device Identitie -Airwatch, Intune
- Enterprise Public Key Infrastructure services management and design
- Zero Trust architecture design, Microsegmentation
- IPV4/IPV6 enterprise network / campus engineering
- Secure Web Gateways - Clould explicit, transparent - Forcepoint, zScaler, Bluecoat
- Enterprise Security Inforrmaion & Event management - Q-RADAR, LogRythem, Arcsight, AlienVault, Enterprise Splunk
- Identity and access management -OKTA, Ping Identity, Active Directory, OpenLDAP
- Platform engineering and security - Win10, Linux -SCCM LANDESK
- Secure Remote access services - Pulse VPN and Cisco SSL-VPN, IPSec
|
- Digital transformation and cloud migration strategy and roadmaps
- Interconnection Oriented Architecture Cloud services design
- Amazon Web Services - Solutions Architecture / Security Compute, storage
- Azure Solutions architecture
- Linux systems engineering -
- Web services eCommerce Apache / Tomcat SAP Hybris
- Office 365 migration and Security
- Cloud Access security Broker - Skyhigh, NetSkope
- Public Cloud security - Dome9,
- API Gateway security and design - Apigee, Mulesoft
- Docker, Kubernetes containeraztion
- Cloud Identity Provider SAML2, OIDC, OAuth2
- Web Application Firewall WAF policy design
- CI/CD Jenkins Lower environments
- Internet secure file transmission solutions
- Dynamic and Static content delivery -Akamai, LimeLight
- Best practice security standards development based on CSA, CIS, NIST, FedRAMP, OWASP
|
- Enterprise Risk management frameworks
- Enterprise Risk management platform design and deployment - Archer, LockPath, Riskonnect
- SaaS On-boarding security assessmsnts
- Physical & logical security assessments
- Application security assessments
- Penetration testing & ethical hacking
- Vendor Security assessments
- Off-Shore support and development team security assessments - Bangalore, Pene, Hyderabad
|
- Security operations program development & design
- Incident Responce Plans
- Playbooks
- Investigations Forensics
- Computer crime investigations working for law enforcement LVM
- Expert Witness testimony
- Phishing testing and Social engineering toolkit development
- Expert witness testimony
- Response planning & analysis
- Incident handling services
- Internet crime investigations and digital forensics
- Regular expressions, scripting
|