Abdul Rehaman

Abdul Rehaman Email and Phone Number

Information Security Manager at Cognizant @ Cognizant
teaneck, new jersey, united states
Abdul Rehaman's Location
Bengaluru, Karnataka, India, India
About Abdul Rehaman

Information Security professional with 14 years of experience in IT Risk Management, IT Audits, Compliance Management, Vulnerability Assessment, Web Application Security Testing, Penetration Test, Mobile Application Security, Change Management, Symantec Antivirus Management, Patch Management, Network Security Configuration Analysis, BCM , Incident Management and DLP event analysis.

Abdul Rehaman's Current Company Details
Cognizant

Cognizant

View
Information Security Manager at Cognizant
teaneck, new jersey, united states
Website:
cognizant.com
Employees:
278214
Abdul Rehaman Work Experience Details
  • Cognizant
    Manager- Irm
    Cognizant 2018 - Present
    Bengaluru, Karnataka
  • L&T Technology Services Limited
    Information Security Manager
    L&T Technology Services Limited 2015 - 2018
    Bengaluru Area, India
  • Mphasis
    Assistant Manager: Information Security And Compliance
    Mphasis May 2013 - Jul 2015
    Bangalore
    Key Result Areas:• Assist business to identify, manage and track operational and fraud risks associated with people, processes and technology in a consistent manner and ongoing basis• Manage risk assessments and periodic control testing in reference to ISO27001, ISO3100, ANZ 4360 and COBIT frameworks • Overseeing the establishment, implementation and adherence to policies and standards that guide and support the terms of the information security strategy• Conduct risk based audits on ISO 27001 and PCIDSS information security standards for all the enterprise accounts• Identify, research, evaluate, and/or resolve risk issues impacting the business• Advising and making recommendations regarding appropriate personnel, physical and technical security controls• Good understanding on SSAE 16, ISAE 3402, HIPPA, COBIT, ISO3100, ANZ 4360, NIST frameworks and Vendor Assessment Audits • Strong conceptual understanding of information security and risk concepts and ability to relate them to business objectives• Managing the information security incident management program to ensure the prevention, detection, containment and correction of security breaches• Vendor or partner security risk evaluation• Network device configuration review and analysis• Business continuity and incident management plan review and analysis• Creating an enterprise wide information security education and awareness campaign• Periodic management reporting through established matrices and effective measurement of risk attributes to report risk trending and demonstrate compliance• Monitor, measure, test and report on the effectiveness and efficiency of information security controls and compliance with information security policies
  • Happiest Minds Technologies
    Consultant- Information Security
    Happiest Minds Technologies Dec 2011 - May 2013
    Bangalore
    Key Result Areas:• Evaluate application architecture in relation to its target deployment environment and infrastructure • Review design choices in each of the key vulnerability categories defined by a security frame work• Manual and tool based reviews of source code to identify code-level issues that may enable an attacker to compromise an application, system, or business functionality• Identify and rate threats based on a solid understanding of the architecture and implementation of the application• Address threats with appropriate countermeasures in order to reduce the risk• Conducting vulnerability assessments on web apps, infra devices based on industry standard frameworks like OWASP, WASC and SANS.• Analyze the vulnerabilities for possible exploitation and conduct penetration testing• Conduct security assessments on android and iOS apps• Implement secure coding techniques into mobile development lifecycle to protect mobile apps from high risk attacks• Analyze security of network communications and data transmissions• Residual data analysis of local storage and caching (passwords, usernames, and other sensitive data)• Native code execution analysis• Security configuration review and hardening guidelines for firewalls, routers, switches ,web servers and database servers
  • Wipro Technologies
    Consultant-Information Security
    Wipro Technologies Apr 2011 - Dec 2011
    Bangaon Area, India
    Key Result Areas:• Understanding the client network architecture and necessity of vulnerability assessment• Perform network device and server vulnerability assessments, review findings with clients and implement countermeasures • Perform penetration testing using metasploit on internal and external infrastructure devices. Social Engineering attack using BackTrack• Wi-Fi basic penetration test using the applications WiFinder, Aircrack –ng and Kismet• Defining and implementing ways to minimize the consequences of a potential attack• Provide application security related consultation support for, threat modelling, security controls vulnerability assessment and counter measure designing• Provide consultation support to the development team with regards to the detected vulnerabilities• Identify, evaluate and implement corrective action against risks that may result in loss, damage or legal liability• Risk analysis of network devices and server decommissioning• Coordinate with different IT departments and CISO’s for getting approvals for new projects• Responsible for giving solution to assist enterprises to administer important business as well as operational risks and to identify best practices• Change management responsibilities using remedy tool
  • Timken
    Information Security Analyst
    Timken Nov 2007 - May 2011
    Bangalore
    Key Result Areas:• Infrastructure and web application security assessments• Corporate Symantec anti-virus management• E-mail gateway management- Message Labs• Microsoft Tuesday patch analysis• Compliance and auditing• Business continuity process-disaster recovery policy creation and audit
  • Hewlette Packard
    Technical Analyst
    Hewlette Packard Jul 2005 - Nov 2007
    Bengaluru Area, India

Abdul Rehaman Skills

Information Security Vulnerability Assessment Application Security Penetration Testing It Audit Iso 27001 Ceh Web Application Security Comptia Information Security Management Security Audits Security Architecture Design Security Awareness Computer Security Vulnerability Management Pci Dss Itil Computer Forensics Arcsight Iso 27001 Lead Auditor Ssae 16 Cobit Risk Management Incident Management Networking Security Business Continuity Firewalls Payment Card Industry Data Security Standard

Abdul Rehaman Education Details

Frequently Asked Questions about Abdul Rehaman

What company does Abdul Rehaman work for?

Abdul Rehaman works for Cognizant

What is Abdul Rehaman's role at the current company?

Abdul Rehaman's current role is Information Security Manager at Cognizant.

What schools did Abdul Rehaman attend?

Abdul Rehaman attended Visvesvaraya Technological University.

What skills is Abdul Rehaman known for?

Abdul Rehaman has skills like Information Security, Vulnerability Assessment, Application Security, Penetration Testing, It Audit, Iso 27001, Ceh, Web Application Security, Comptia, Information Security Management, Security Audits, Security Architecture Design.

Who are Abdul Rehaman's colleagues?

Abdul Rehaman's colleagues are Rohith Gunda, Mugilan Mathisagaran, Arjunan Singh, Joy Khambhaita, Rajkumar Gande, V B, Lakshmi Karanam.

Not the Abdul Rehaman you were looking for?

  • Abdul Rehaman

    Advocate | Skilled In Litigation & Legal Research | Advocate For Public Policy
    Bengaluru
  • Abdul Rehaman

    𝐓𝐚𝐥𝐞𝐧𝐭 𝐀𝐜𝐪𝐮𝐢𝐬𝐢𝐭𝐢𝐨𝐧 𝐒𝐩𝐞𝐜𝐢𝐚𝐥𝐢𝐬𝐭 @ 𝐓𝐀𝐆𝐋𝐄𝐓 𝐂𝐨𝐧𝐬𝐮𝐥𝐭𝐢𝐧𝐠 || 𝐇𝐢𝐫𝐢𝐧𝐠 ||𝐉𝐚𝐯𝐚||.𝐍𝐞𝐭||𝐌𝐮𝐥𝐞 𝐒𝐨𝐟𝐭||𝐒𝐚𝐥𝐞𝐬𝐟𝐨𝐫𝐜𝐞||𝐏𝐲𝐭𝐡𝐨𝐧||𝐒𝐀𝐏||𝐏𝐞𝐠𝐚||𝐈𝐁𝐌 𝐒𝐈||
    Bengaluru
  • Abdul Rehaman

    Senior Salesforce Developer | 5X Salesforce Certified
    Bengaluru
  • Abdul Rehaman

    Senior Associate
    Bengaluru
  • Abdul Rehaman

    Entrepreneur | Investor | Real Estate & Construction | Bussiness Strategy Planner |Founder Of Mdgroup247
    Bellary

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.