Peng J.

Peng J. Email and Phone Number

Senior Director,Head of Cyber security and data privacy compliance service,Greater China @ 埃森哲
Beijing, China
Peng J.'s Location
Chaoyang District, Beijing, China, China
About Peng J.

Over 18 years extensive experiences in Cyber security, include Strategic plan for Cyber& risks ,Cyber security architecture design,Privacy by design by default ,Identiy and Access governance and management(IAM),Zero Trust framework,Security Information and Event Management(SIEM),sensitive Data Protection, Security Operation Center(SOC)process, DevSecOps,cloud security solution and Managed Security Services(MSS).Over 5 years direct people management experience for both delivery and relationship management resources and supervises the services delivered to customers by team.Familiar with ISO27001 based ISMS framework and classified protection of information system.Familiar with ISO27701 based PIMS framework for Privacy Informamtion Management.Knowledge in NIST information security framework and NIST SP 800-53 control pointsData Privacy management skill and knowledge in Data Privacy including CSL (China Cyber Security Law) and GDPR (general data protection regulation). Familiar with China MLPS v2.0.Business acumen in client and vendor relationship development, maintenance and management.Advanced presentation and reporting skill to various levels including CxO,translate early business needs and insights into actionable Solution strategies and drivie these initiatives to early results and business value.Solid problem solving and analytical skills with the ability to quickly evaluate issues and recommend an appropriate solution.

Peng J.'s Current Company Details
埃森哲

埃森哲

View
Senior Director,Head of Cyber security and data privacy compliance service,Greater China
Beijing, China
Website:
accenture.com
Employees:
636296
Peng J. Work Experience Details
  • 埃森哲
    Senior Director,Head Of Cyber Security And Data Privacy Compliance Service,Greater China
    埃森哲
    Beijing, China
  • 埃森哲
    Senior Director,Head Of Cyber Security &Data Privacy Compliance Service,Greater China
    埃森哲 Jun 2020 - Present
    中国 北京市
    Build Cyber security service team from scratch;End-to-end P&L responsibility for Cybersecurity Business in Greater China. Lead the GC Team to achieve double digit growth and build plan for strategic play in the competitive environment.Design data privacy by default by design solutions and form company assets to integrate with existing services offerings, such as data middleware, SAP design, DevOps development, cloud native development, etc.leads a high-performance team of seasoned service delivery professionals well versed in cloud adoption, delivery management practices, and technology trends; Be accountable for end-to-end service delivery for MNC and local customers, representing Accenture Security Services throughout all deal phases while demonstrating a critical partnership with internal and external stakeholders;Be responsible for driving customer satisfaction, driving customer effective use of Solutions from multiple vendors , services revenue growth & profitability, and the governance of delivery for their portfolio of accounts.
  • Dxc Technology
    Technical Lead Of Cyber Security Consulting And Managed Security Services
    Dxc Technology Apr 2019 - Jun 2020
    Beijing
    Setup security services technical team from scratch; Acts as trusted advisor at executive level for many largest clients - strong boardroom participant; Identify market trend and strategy for cybersecurity business in China market; Leads a portfolio of engagement initiatives and focusing on the most significant client engagements Shapes the strategic agenda and creating the context for successful partnerships which generate significant business; Design and setup local Managed Security Services Platform(MSSP) with local DataCenter ; Strong and demonstrable expertise in Managed Security Service Provider (MSSP), network security monitoring and incident response process; Strong inter-personal and networking skills with a strong ability to work in a team environment; Ability to work under stressful and tight deadlines as well as the ability to manage in a fast paced environment; Think through problems for logical solutions, and remain calm and professional under stress; Give direction, and provide guidance to employees and security staff during emergencies; Familiar with emergency procedure protocols and regulatory interfaces; Experience in root cause analysis, industry benchmarking, survey evaluation and data interpretation is required; Security Solution include: Intelligence Security Operation(SOC), Identity and Access, Data and privacy protection, Security Risk Management, Infrastructure and Endpoint Security, Auto Drive Platform Security , CyberInsurance Security solution..
  • Tencent Cloud
    Chief Architect Of Situation Awareness And Threat Intelligence On Cloud
    Tencent Cloud Mar 2018 - Apr 2019
    Beijing
    Lead the team design and develop Situation Awar eness System(on premise and SaaS) based on Bi g Data and Knowledge Graph open-source platfor m(Hadoop, ELK, Flink Streaming,Flume,S2Graph..) and Agile methodologies (Scrum). Lead the team design and integrate Tencent’s Thr eat Intelligence with Situation Awareness platform. Lead the team design UEBA component based on User identity and privilege abnormal behavior usi ng machine learning. Lead the team design NTA (Network Traffic Analyst) platform based on Lockheed Martin “Cyber Kill Chain” framework. Design 4A (Authentication, Authorization, Account , Audit) platform based on WeChat Enterprise Edition and Situation Awareness platform. Design Integrated Enterprise Security solution based on Tencent’s endpoint protection, Network protection, Data protection, 4A and cloud security platform.
  • Ibm
    Senior Cyber Security Consultant
    Ibm Feb 2004 - Oct 2017
    Beijing City, China
    develop Information Security solutions to assist clients to implement sustainability through their business operations based on ISO27001 ISMS & IBM Security Framework control points ,include: People security(IAM),Application Security,sensitive Data protection,network Security, desktop security, Mobile Security, Cloud security, Security intelligence(NG-SIEM) ,Security Risk analysis, Security Compliance, APT protection and Emergency response process. Identify Security opportunities and work with Sales team and support of Business partners , Lead product proof-of-concept(POC) based on customer requirement,provide advise to business partner for large and complex projects, Designing, assessing and help Business Partner implementing technology risk and information security management frameworks, policies, standards, procedures, and application systems / technology infrastructure, and security solutions such as Enterprise-wide Identity & Access Management (I&AM),Security Information & Event Management (SIEM) solutions, using ISO27001,PCI,SOX as the internationally recognized information security and IT service management standards, Internal and business partner enablement training for new products and solution.

Peng J. Education Details

Frequently Asked Questions about Peng J.

What company does Peng J. work for?

Peng J. works for 埃森哲

What is Peng J.'s role at the current company?

Peng J.'s current role is Senior Director,Head of Cyber security and data privacy compliance service,Greater China.

What schools did Peng J. attend?

Peng J. attended 北京大学, Beijing University Of Technology.

Who are Peng J.'s colleagues?

Peng J.'s colleagues are Alessia Canciullo, Jeremy Mendoza, Chidhambaram Nagappan, Aira Fhaye Mesa, Johannes Erhazar, Cao Minh, Himabindu Keerthi.

Not the Peng J. you were looking for?

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.