Lalit Kumar Email and Phone Number
Lalit Kumar personal email
- Valid
As a Manager- Cyber Risk and Security at Wipro, I have over sixteen years of experience in delivering security solutions and services to clients across various industries. I am certified in ITIL, ISO 27001 and have a strong background in IT risk management, vulnerability management, and governance.My core competencies include performing third party information security assessments, defining and maintaining target assessment plans, carrying out assurance activities, and reporting and resolving security incidents. I also lead and support a team of cyber security professionals, ensuring quality, efficiency, and compliance. My mission is to help clients protect their data, systems, and assets from cyber threats and risks.
-
Manager- Cyber Risk And SecurityWipro Feb 2022 - PresentGreater NoidaIT Risk Management, Third Party Risk Management, Vulnerability Management and Governance -
Cyber Security Team LeadAccenture May 2017 - Feb 2022Gurugram, Haryana, India• Engaging client’s third-party vendor owner, Data Protection and Security team to determine if there are any known security risks or issues that should be investigated in more depth during the assessment. • Performing third party information security assessments as per the questionnaire provided by client for existing and new in scope third-party vendors. • Carrying out assurance activity on most critical Third Party suppliers, and QA the work of team members • Defining and continuously maintaining target assessment plan for the third-party vendors in scope based on completed tiering workbooks and the Prioritization Workflow provided by client. • Scheduling of in scope existing third-party vendor information security assessments. • Tracking and periodic MI reporting of third-party information security assessments for third-party vendors.• Delivered end-to-end Toxic Combinations process to the agreed toxics methodology framework and operating model. • Identify, detect and remediate toxic combinations. • Identify key applications and entitlements that allow users to execute the identified sensitive business transactions. • Build toxic combination rule sets and analyze access within and across applications to identify potential breaches. • Risk Assessment, Management and Security Patch Compliance. • EHRS - Ethical Hacking and Remediation Services: Reporting and working with infra teams to remediate the identified vulnerabilities and tracking the risks periodically till remediation.• Execution of Information Security Awareness Training and activities. • Management and administration of SLA for the entire Non-Compliance remediation.• Working on SOX Controls related to Access Control and Firefighter Id’s on various SAP Systems. -
Business AnalystBarclays Jun 2015 - May 2017Pune, Maharashtra, India• Data privacy and access classification reviews. • Identity compliance- To ensure authorised user access and to prevent unauthorised access to systems, services and applications. • Administration of RSA account for the users who are working remotely by using ACE Admin tool. • Security access compliance – Group, shared folders, Secure data transfer. • Project Compliance, Change and Release Management • Request workflow review and assessment. • Security Incident Management review and reporting. • Liaise between other departments (Windows Server, Messaging, Movers, Helpdesk & Application Support Teams) as required for day to day work to support Operations. • Part of weekly ops call, Quality Check & Process update. • Preparing Team reports on Weekly & Monthly basis and sharing new updates. • Handling escalation Call / E-mail and maintain Customer Satisfaction. • Training & Mentoring the new joiners about the process to enhance their performance & productivity. • Creation of the process documents for newly on-boarded Services -
Technical LeadCognizant Apr 2012 - Jun 2015Pune• User access management – AD and Messaging • Security access management – group and shared folders. Secure data transfer • Performing DNS entries and IP assignments on server by using our tool Vital QIP • Account attestation for idle, orphan accounts and recertification• Weekly & Monthly reporting to stake holders & Management Client, • Maintaining and monitoring SLA, OLA & KPI (Key Performance Indicators) • Quality analysis & audit report assessment of SLA breached SRs, incidents • Daily Dashboard preparation and Application On-boarding as per compliance standard defined by security team -
Engineer- EusMicroland Ltd. Aug 2009 - Mar 2012Jaipur, Rajasthan, India• User Account Administration and access management. Provide a secure and authentic access to users on different Banking and Finance applications. • To provide access rights on different level by approving the user IDs for various server & domains and modify the access rights as per the requirement of production & operations. • Creation, Modifications & four eye check (secure access & delegation) for applications e.g.: CINQ.NET, Image Solutions, Departmental Internet Trading, Direct Internet Trading, E-Bills Management within Identity Management Services. Management with the classifications of Security Administration in I.T. Infrastructure.• Responsible for implementing and maintaining system security. • Defining users, resources, access levels, and facilities. • Controlling the security environment by using control options and TSS Commands. • Monitoring resource access violations with the auditing, tracking, and Reporting options. • Working on how CA Top Secret works and how to best implement security for your system. • Acts as the liaison between CA Top Secret and the users who need to access the facilities and resources it secures. • Creation of all types of user, batch, and profiles IDs based on the requests requirements. • Generating scripts for annual & semiannual reports for overall Ids• Maintenance of Bloomberg user ID, assigning necessary sales & trading privileges, Creation of Bloomberg Trading Books (based on requirements), Generating SSRT & Trace Reports. Recertification Process, Security Operations and Access Audit: • Maintaining the ID inventory to trace the stale and orphan accounts. • Processing the leavers requests on primary accounts, remote secure devices and Blackberry. • Auditing access levels of users and regular checks between regular intervals as agreed with business and maintaining the proper Access Management system -
Associate Engineer3I Infotech Ltd. Nov 2008 - Jul 2009Jaipur, Rajasthan, IndiaMaintaining LAN by providing support in sense of troubleshooting and Installation.Hardware installations of switches, modem & routers.System support for windows users by providing support in sense of installation, configuration & troubleshooting.Application support for various web based interface & internet profiles.Daily report generation on the behalf of call logs and completed incidents.
Lalit Kumar Education Details
-
Electronics And Communication Engineering; 2008
Frequently Asked Questions about Lalit Kumar
What company does Lalit Kumar work for?
Lalit Kumar works for Wipro
What is Lalit Kumar's role at the current company?
Lalit Kumar's current role is Cybersecurity Manager at Wipro | IT Risk Management, Third Party Risk Management.
What is Lalit Kumar's email address?
Lalit Kumar's email address is si****@****ail.com
What schools did Lalit Kumar attend?
Lalit Kumar attended Sri Balaji College Of Engineering & Technology,jaipur.
Who are Lalit Kumar's colleagues?
Lalit Kumar's colleagues are Syed Younus, Rakesh Babu, Ria Saha, Kavya K, Bhavani Lalam, Natasha Bangari, Vijayalakshmi T.
Not the Lalit Kumar you were looking for?
-
-
Lalit Kumar
Data | Busniess Analyst, Proficient In Python, Sql, Tableau And Power Bi | Seeking To Leverage Data-Driven Problem-Solving Skills For More Accurate Decision-Making.Delhi, India -
Lalit Kumar
West Delhi -
Lalit kumar
Hyderabad -
3yahoo.co.in, itcinfotech.com, sas.com
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial