Abdul Rehaman Email and Phone Number
Information Security professional with 14 years of experience in IT Risk Management, IT Audits, Compliance Management, Vulnerability Assessment, Web Application Security Testing, Penetration Test, Mobile Application Security, Change Management, Symantec Antivirus Management, Patch Management, Network Security Configuration Analysis, BCM , Incident Management and DLP event analysis.
Cognizant
View- Website:
- cognizant.com
- Employees:
- 278214
-
Manager- IrmCognizant 2018 - PresentBengaluru, Karnataka -
Information Security ManagerL&T Technology Services Limited 2015 - 2018Bengaluru Area, India -
Assistant Manager: Information Security And ComplianceMphasis May 2013 - Jul 2015BangaloreKey Result Areas:• Assist business to identify, manage and track operational and fraud risks associated with people, processes and technology in a consistent manner and ongoing basis• Manage risk assessments and periodic control testing in reference to ISO27001, ISO3100, ANZ 4360 and COBIT frameworks • Overseeing the establishment, implementation and adherence to policies and standards that guide and support the terms of the information security strategy• Conduct risk based audits on ISO 27001 and PCIDSS information security standards for all the enterprise accounts• Identify, research, evaluate, and/or resolve risk issues impacting the business• Advising and making recommendations regarding appropriate personnel, physical and technical security controls• Good understanding on SSAE 16, ISAE 3402, HIPPA, COBIT, ISO3100, ANZ 4360, NIST frameworks and Vendor Assessment Audits • Strong conceptual understanding of information security and risk concepts and ability to relate them to business objectives• Managing the information security incident management program to ensure the prevention, detection, containment and correction of security breaches• Vendor or partner security risk evaluation• Network device configuration review and analysis• Business continuity and incident management plan review and analysis• Creating an enterprise wide information security education and awareness campaign• Periodic management reporting through established matrices and effective measurement of risk attributes to report risk trending and demonstrate compliance• Monitor, measure, test and report on the effectiveness and efficiency of information security controls and compliance with information security policies -
Consultant- Information SecurityHappiest Minds Technologies Dec 2011 - May 2013BangaloreKey Result Areas:• Evaluate application architecture in relation to its target deployment environment and infrastructure • Review design choices in each of the key vulnerability categories defined by a security frame work• Manual and tool based reviews of source code to identify code-level issues that may enable an attacker to compromise an application, system, or business functionality• Identify and rate threats based on a solid understanding of the architecture and implementation of the application• Address threats with appropriate countermeasures in order to reduce the risk• Conducting vulnerability assessments on web apps, infra devices based on industry standard frameworks like OWASP, WASC and SANS.• Analyze the vulnerabilities for possible exploitation and conduct penetration testing• Conduct security assessments on android and iOS apps• Implement secure coding techniques into mobile development lifecycle to protect mobile apps from high risk attacks• Analyze security of network communications and data transmissions• Residual data analysis of local storage and caching (passwords, usernames, and other sensitive data)• Native code execution analysis• Security configuration review and hardening guidelines for firewalls, routers, switches ,web servers and database servers -
Consultant-Information SecurityWipro Technologies Apr 2011 - Dec 2011Bangaon Area, IndiaKey Result Areas:• Understanding the client network architecture and necessity of vulnerability assessment• Perform network device and server vulnerability assessments, review findings with clients and implement countermeasures • Perform penetration testing using metasploit on internal and external infrastructure devices. Social Engineering attack using BackTrack• Wi-Fi basic penetration test using the applications WiFinder, Aircrack –ng and Kismet• Defining and implementing ways to minimize the consequences of a potential attack• Provide application security related consultation support for, threat modelling, security controls vulnerability assessment and counter measure designing• Provide consultation support to the development team with regards to the detected vulnerabilities• Identify, evaluate and implement corrective action against risks that may result in loss, damage or legal liability• Risk analysis of network devices and server decommissioning• Coordinate with different IT departments and CISO’s for getting approvals for new projects• Responsible for giving solution to assist enterprises to administer important business as well as operational risks and to identify best practices• Change management responsibilities using remedy tool -
Information Security AnalystTimken Nov 2007 - May 2011BangaloreKey Result Areas:• Infrastructure and web application security assessments• Corporate Symantec anti-virus management• E-mail gateway management- Message Labs• Microsoft Tuesday patch analysis• Compliance and auditing• Business continuity process-disaster recovery policy creation and audit -
Technical AnalystHewlette Packard Jul 2005 - Nov 2007Bengaluru Area, India
Abdul Rehaman Skills
Abdul Rehaman Education Details
-
Computer Science
Frequently Asked Questions about Abdul Rehaman
What company does Abdul Rehaman work for?
Abdul Rehaman works for Cognizant
What is Abdul Rehaman's role at the current company?
Abdul Rehaman's current role is Information Security Manager at Cognizant.
What schools did Abdul Rehaman attend?
Abdul Rehaman attended Visvesvaraya Technological University.
What skills is Abdul Rehaman known for?
Abdul Rehaman has skills like Information Security, Vulnerability Assessment, Application Security, Penetration Testing, It Audit, Iso 27001, Ceh, Web Application Security, Comptia, Information Security Management, Security Audits, Security Architecture Design.
Who are Abdul Rehaman's colleagues?
Abdul Rehaman's colleagues are Rohith Gunda, Mugilan Mathisagaran, Arjunan Singh, Joy Khambhaita, Rajkumar Gande, V B, Lakshmi Karanam.
Not the Abdul Rehaman you were looking for?
-
Abdul Rehaman
Advocate | Skilled In Litigation & Legal Research | Advocate For Public PolicyBengaluru -
Abdul Rehaman
𝐓𝐚𝐥𝐞𝐧𝐭 𝐀𝐜𝐪𝐮𝐢𝐬𝐢𝐭𝐢𝐨𝐧 𝐒𝐩𝐞𝐜𝐢𝐚𝐥𝐢𝐬𝐭 @ 𝐓𝐀𝐆𝐋𝐄𝐓 𝐂𝐨𝐧𝐬𝐮𝐥𝐭𝐢𝐧𝐠 || 𝐇𝐢𝐫𝐢𝐧𝐠 ||𝐉𝐚𝐯𝐚||.𝐍𝐞𝐭||𝐌𝐮𝐥𝐞 𝐒𝐨𝐟𝐭||𝐒𝐚𝐥𝐞𝐬𝐟𝐨𝐫𝐜𝐞||𝐏𝐲𝐭𝐡𝐨𝐧||𝐒𝐀𝐏||𝐏𝐞𝐠𝐚||𝐈𝐁𝐌 𝐒𝐈||Bengaluru -
-
-
Abdul Rehaman
Entrepreneur | Investor | Real Estate & Construction | Bussiness Strategy Planner |Founder Of Mdgroup247Bellary
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial