Albin Thomas work email
- Valid
- Valid
Albin Thomas personal email
- Valid
With over 15 years in Information Security, I specialize in Security Governance, Risk, and Compliance (GRC) Management, with a deep dive into Information Security Management Systems (ISMS), Compliance Audits, and Security Architecture Reviews. My expertise encompasses regulatory compliances such as PCI DSS,SAMA CSF, NCA, and ISO 27001, alongside Network Security, Vulnerability Management, and Penetration Testing across Web and Mobile platforms. As a seasoned leader in both technical and process audits, I excel in identifying critical risk areas, compliance gaps, and in devising robust security policies and procedures. My proven track record includes conducting thorough risk assessments, developing strategic risk mitigation plans, and steering organizations through complex audits for regulatory compliance. This extensive background underscores my dedication to enhancing organizational governance, adeptly managing complex risks, and upholding high compliance standards through a strategic blend of technical and process-oriented insights for optimal security postures.Professional Credentials:CISSP, CISM, BSI ISO 27k LA, OSCE, OSCP, CHFI, ECSA, CEH, and A+ Certified.
Freelance
-
Senior Information Security ConsultantFreelance Jan 2017 - PresentSaudi ArabiaStrategic Security Leadership: Drive the development and implementation of comprehensive Information Security strategies, ensuring alignment with organizational goals and regulatory requirements. Spearhead initiatives across Security Governance, Risk Management, and Compliance (GRC) to enhance security postures and mitigate risks.Compliance and Regulatory Expertise: Act as the principal advisor on compliance matters, interpreting and navigating through complex regulations such as SAMA CSF, NCA, ISO 27001, PCIDSS 4 and other pertinent standards. Lead efforts to achieve and maintain compliance, managing audits and ensuring adherence to legal and regulatory frameworks.Risk Assessment and Mitigation: Conduct in-depth risk assessments to identify vulnerabilities and threats. Develop and execute robust risk mitigation strategies, prioritizing resources to address critical risk areas effectively. Facilitate risk management processes, incorporating dynamic risk analysis and mitigation techniques.Security Policy Development: Craft and implement comprehensive security policies, standards, and procedures. Ensure policies are up-to-date, relevant, and in strict alignment with global best practices and regulatory requirements, fostering a culture of security awareness across the organization.Technical Audits and Penetration Testing: Lead technical and process audits, employing state-of-the-art tools and methodologies for network security, vulnerability management, and penetration testing (Web/Mobile). Identify security weaknesses and compliance gaps, providing actionable insights for enhancement.
-
Cyber Security ManagerCrowe Feb 2021 - Aug 2022Dubai, United Arab EmiratesStrategic Security Leadership: Spearhead cybersecurity strategy, aligning with business objectives and compliance standards (ISO 27001, NESA).Risk Management: Conduct risk assessments, identifying and mitigating vulnerabilities to minimize cyber threats.Compliance and Governance: Oversee adherence to regulatory requirements, enhancing compliance frameworks to include PCI DSS, ensuring data security and integrity.Incident Management: Lead swift incident response initiatives to mitigate impact and maintain operational resilience.Policy Development: Craft and enforce cybersecurity policies and protocols, promoting a secure organizational environment.Team Leadership: Mentor and develop a cybersecurity team focused on excellence and continuous skill advancement.Stakeholder Engagement: Communicate effectively with stakeholders, articulating cybersecurity risks and strategies comprehensively. -
Sr. Information Security ConsultantIsyx Technologies Feb 2012 - Dec 2016Dubai, UaeIn my tenure as a Sr. Information Security Consultant with ISYX Technologies, I led comprehensive Vulnerability Assessments and Penetration Testing (VA/PT) initiatives, alongside performing rigorous Security Audits for a diverse client base across the GCC and India. Specializing in Web Application, Network, and Mobile Application Penetration Testing, my role involved:Diverse Industry Expertise: Successfully delivered critical security solutions to high-profile clients in Banking, Telecom, and Airline industries, among government and private sectors.Comprehensive Security Assessments: Conducted in-depth VA/PT across various platforms to identify vulnerabilities, safeguarding client infrastructures against cyber threats.Strategic Security Audits: Performed detailed security audits, evaluating and enhancing clients' security policies, procedures, and controls to meet stringent compliance standards.Specialized Penetration Testing: Utilized advanced techniques in Web, Network, and Mobile App Penetration Testing to uncover potential security weaknesses, providing actionable insights and remediation strategies. -
Associate ConsultantSify Technologies Limited. Oct 2010 - Jan 2012Riyadh, Saudi ArabiaAs an Associate Consultant at Sify Technologies Ltd, I specialized in enhancing clients' cybersecurity posture through comprehensive vulnerability assessments and penetration testing. My responsibilities included:Vulnerability Assessments (VA): Conducting thorough evaluations to identify vulnerabilities across various client infrastructures, ensuring robust security measures are in place.Penetration Testing (PT): Executing detailed penetration tests for clients to uncover potential security weaknesses, simulating real-world attack scenarios.Internal VA/PT: Leading internal assessments to secure our clients’ critical systems and networks against potential threats.Wireless Penetration Testing: Conducting specialized penetration tests on wireless networks to identify and mitigate risks, safeguarding sensitive information.Web Application Penetration Testing (WAPT): Performing WAPT for both internal and external sites, focusing on identifying security vulnerabilities within web applications to prevent potential exploits. -
Systems Security Engineer And Security TrainerMirox Cyber Security & Technology Dec 2008 - Oct 2010Trivandrum, Kerala, IndiaAt Mirox Cyber Security & Technology Pvt Ltd, I combined technical expertise and instructional skills to enhance our security infrastructure and educate the next generation of cybersecurity professionals. My key contributions included:Vulnerability Assessments and Penetration Testing: Conducted comprehensive vulnerability assessments and penetration testing to identify and mitigate security risks, safeguarding critical infrastructure.Cybersecurity Education: Led training and mentoring sessions for network administrators, professionals, and students on EC-Council's CEHv6 security protocols, significantly raising the standard of cybersecurity knowledge and awareness.Firewall Implementation: Spearheaded the implementation of advanced firewall solutions to fortify network defenses against external threats.Network Maintenance and Troubleshooting: Managed and resolved complex network issues, ensuring the company’s internal network remained robust and secure.
Albin Thomas Skills
Albin Thomas Education Details
-
Computer Applications -
Lourds Mount -
Industrial Chemistry
Frequently Asked Questions about Albin Thomas
What company does Albin Thomas work for?
Albin Thomas works for Freelance
What is Albin Thomas's role at the current company?
Albin Thomas's current role is Senior Security Consultant | CISSP, CISM, ISO 27k LA, OSCE, OSCP, CHFI, ECSA, CEH, and A+ Certified. | Strengthening Cyber Defenses for Government & Private Sectors in Banking, Telecom, and Airlines".
What is Albin Thomas's email address?
Albin Thomas's email address is al****@****ech.com
What schools did Albin Thomas attend?
Albin Thomas attended University Of Kerala, Lourds Mount, University Of Kerala.
What skills is Albin Thomas known for?
Albin Thomas has skills like Networking, Firewalls, Vulnerability Assessment, Computer Forensics, Information Security, Penetration Testing, Network Security, Ceh, Security, Computer Security, Cissp, Application Security.
Not the Albin Thomas you were looking for?
-
Albin Thomas
Logistics And Scm Student | Committed To Efficiency And Sustainability In Supply ChainsKochi -
-
-
Albin Thomas
Kottayam -
1rathi.com
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial