A certified and experienced associate for information security and system compliance with an in-depth knowledge of security procedures of cloud-based systems, having an eye for attention to detail. I am a perfectionist that focuses on the smallest of the details to ensure and enhance maximum output with positive work ethics. Being a part of the corporate industry, I have adequate knowledge of the business processes in the industry.
DevOps engineer with hands-on experience in cloud integration, data storage, security, and compliance. I have an attention to detail personality that takes me over the edge and enables me to use my creativity and out of box approach in deriving useful results on real-time analysis.
Project: iCrowdNewswire Advertising Driven Press Release Distribution• Lead implementation and improvement of Information Security practices through policies, procedures, and guidelines to ensure that information security requirement and business objective is aligned
• Lead an effective Information Security Awareness Program as per organization culture and requirement
• Reviews all security-related security plans throughout the organization’s network, acting as a liaison to information Systems• Monitor compliance with information Security policies and procedures, referring problems to the appropriate department manager• Monitor the Internal control systems to ensure the appropriate access levels are maintained• Communicate security policies and procedures to all staff, when necessary, for education and approval• Vulnerability Management-Perform Vulnerability Assessment of critical servers or systems and remediation of IT Security Vulnerabilities• Ensuring authorized access by investigating improper access; revoking access; reporting violations; monitoring information requests.• Identify information security deficiencies or risks to appropriate parties. Assist and/or drive remediation activities in order to mitigate security deficiencies as identified through regulatory audits/assessments.• Implement and oversee technological upgrades, improvements and major changes to the information security environment• Endpoint Security - working with IT Network to maintain a high standard of security across our desktop and mobile computing infrastructure• Working with Editorial team, Operation Team social and digital marketing team to ensure compliance with Terms and advertising policies• Communicate information security goals and new programs effectively with other department managers within the organization• Presenting detailed written reports and verbal presentations to Team & Senior Management
Monitoring of NSS(MSCs, MGW, HLRs, STPs) BSS, UTRAN & EUTRAN Network, escalation to the respective teams & taking follow-up to maintain network reliability.
• Working on NetNumen, NetNumen U31 (2G, 3G & 4G), Network Cloud Engine and U2020 MBB
• Monitoring of auto calls & trouble tickets through the fault management system. Checking of Work orders status and enabling Engineering alarms at sites for planned
• activities and providing support to different vendors for these activities.
• Monitoring and escalation of down sites/ cells to the regional field operations teams.
• Monitoring and escalation of critical and major service-affected alarms of BSCs and RNCs.
• Fault Escalation of BTS/ NodeB/ e-NodeB, BSCs, and RNCs using OSS FM.
• Support to field operations for their queries during troubleshooting and alarm daily and weekly reports sharing.
• Support FOPs team in change management planned activities and support to the field operations team.
• Preparation and submission of daily and weekly reports.
• Creating and implementing an identity verification program for subscribers• Working with editorial to assure content compliance with Terms• Working with social and digital ad teams to ensure compliance with advertising policies• Monitor all operations and infrastructure.• Maintain all security tools and technology.• Monitor internal and external policy compliance• Work with different departments in the organization to reduce risk.• Audit policies and controls continuously.• Ensure cybersecurity stays on the organizational radar.• Detail out the security incident response program
● Examine the IT Environment
● Network Maintenance
● Fixing Network Faults
● Overseeing security of all systems, especially the Internet
● Performing Troubleshooting on all Programs, when required
● Network Analysis and Routine Troubleshooting
● Hardware Configuration including Firewalls and Routers
● Maintaining the Stability of the Core Network
Worked in Networks in all domains of Network Operations Center (NOC)
Worked on Network assistance and Hardware Troubleshooting.