Shreyas Kumar Email and Phone Number
Shreyas Kumar work email
- Valid
Shreyas Kumar personal email
- Valid
- Valid
Shreyas Kumar phone numbers
Security professional with diverse experience with product development, security, IT, privacy and compliance. 18+ years of Software design, development and Security experience with current focus on Payment Security and Infrastructure Security.Security:------------Worked at CISO and Interim CIO at Deserve scaling the team from 1 to 9 in my first year and ramped up the security program from ground up.Managed Uber's Payment Security globally and its PCI DSS in the past. Started Vendor Security Program ground up and managed it for two years.. I work on the following aspects of Uber Infrastructure and Payments Security:Security of Uber Payments BV, the payments entity in Europe to meet PSD2 requirements.Security of Payments InfrastructureSecurity of Acquired companies infrastructureM&A due diligence for payments related assetsIn the past:Operational security and compliance of Adobe Doc Cloud set of products and services.Designed and developed various modules of Oracle Identity Management product.CISSP (Certified Information Systems Security Professional).PhD coursework with focus on payments security.Talked at many security conferences in Asia and North America.Audit and Compliance:-------------------------------First and only PCI-ISA of Uber, responsible for 3 cycles of successful PCI DSS Certifications.In the past:Led PCI DSS Attestation of Compliance for eSign at AdobeLed SOC2 certification project at AdobeLed ISO 27001:2013 implementation and certification of eSign at AdobeCISA (Certified Information Systems Auditor) scored in top 5% in the worldExperience with US EU Safe Harbor and HIPAA Software Design and development:-----------------------------------------------Languages: Java, Perl, C++Products I developed:Oracle Beehive, Oracle Access Manager, Oracle BAM at OracleInsurance and Workflow systems for Singapore govt while working for HCL PerotSun Certified Java ProgrammerIBM Certified Professional for OOAD with UMLIBM Certified Specialist for VisualAge for JavaOracle Certification- Introduction to Oracle: SQL and PL/SQL
-
Professor Of Computer ScienceTexas A&M UniversityCollege Station, Tx, Us -
Professor Of Computer ScienceTexas A&M University Aug 2023 - PresentCollege Station, Tx, UsMy research interests include Cybersecurity, Cyber Warfare, Security Standards and Cyber Insurance.I am teaching the following at TAMU College Station main campus:ENGR-689-602: Applied Blockchain for EngineersPrerequisite: G7/G8 Classification or Instructor ApprovalCSCE 120: Program Design and Concepts (8 Sections 508 to 515)Prerequisite: Grade of C or better in ENGR 102, CSCE 110, CSCE 111, CSCE 206, or PHYS 150.I modernized and taught the following courses in 2023-24:CSCI 310: CybersecurityCSCI 380: Web Programming and InterfaceCSCI 415: Ethics, Law and CybersecurityCSCI 451: Wireless and Mobile SecurityCSCI 465: Smart Things SecurityCSCI 428: Object Oriented DesignCSCI 345: Data Security and Privacy -
Advisory CisoVciso Services Llc Jan 2022 - PresentSecurity and compliance consulting for small businesses and startups
-
Member, Fbi InfragardInfragard Aug 2024 - PresentUsFBI’s premier public/private partnership dedicated to protecting U.S. critical infrastructure and the American people. The InfraGard program provides a vehicle for seamless public-private collaboration with government that expedites the timely exchange of information and promotes mutual learning opportunities relevant to the protection of Critical Infrastructure. -
Mentor And Leadership Coach, Us National Cyber TeamUs Cyber Games Jun 2023 - Jul 2024Ashburn, Virginia, Us -
San Francisco Economic Crimes Task Force (Ectf) PartnerU.S. Secret Service Sep 2015 - Mar 2023Washington, Dc, UsThe US Secret Service was mandated by the USA PATRIOT Act to establish a nationwide network of ECTFs. These bodies collectively provide necessary support and resources to field investigations that meet any one of the following criteria: significant economic or community impact; participation of organized criminal groups involving multiple districts or transnational organizations; or use of schemes involving new technology. Investigations conducted by ECTFs include crimes such as computer generated counterfeit currency; bank fraud; virus and worm proliferation; access device fraud; telecommunications fraud; Internet threats; computer system intrusions and cyber-attacks; phishing/spoofing; assistance with Internet-related child pornography and exploitation; and identity theft. Security professionals subject to certain background checks and join these ECTFs as partners to help the financial security of the US by enhanced public private collaboration. -
Chief Information Security OfficerDeserve Nov 2019 - Dec 2021Palo Alto, California, UsDeserve is a platform to launch and operate Credit cards as a service. Our turnkey branded and co‐branded credit card programs are digital-first, mobile-centric and highly configurable. With Deserve, you can approve more customers with lower losses and provide a superior experience in a secure and compliant way.Security depends on people, processes, and technology. My belief is that if we take care of people first, we can get more out of technology and processes. I work for, and lead, highly motivated and global teams focussing on Security, Privacy, and IT. My teams are responsible for all aspects of security governance, product security, cloud security, incident response, compliance, privacy and IT. The most rewarding aspect of these two years were leading a very happy team and managing the team morale and well-being through the pandemic and remote work. -
Advisory CisoOnscale Sep 2019 - Mar 2020Redwood City, California, UsI advised on matters related to Security, Risk and Compliance. -
Staff Security Engineer / Payments Security LeadUber Sep 2018 - Nov 2019San Francisco, California, UsStarting Sept 2018, I worked in the Core Infrastructure team responsible for securing the Core Infrastructure Foundation.I have led or contributed to the following successful projects:Security of Uber Payments BV, the payments entity in Europe to meet PSD2 requirements.Security of Payments InfrastructureSecurity of Acquired companies infrastructureM&A due diligence for payments related assetsI serve as a security advisor to local teams which need to represent Uber security posture to the governments or local regulators.A diversity leader at Uber, I started and Co-Chair the fastest growing Employee Resource Group, Immigrants ERG. In this capacity I help Uber D&I team and top management in policy formulation such as those are more empathetic to the employees on visas. -
Sr Security Strategist Ii / Payments Security LeadUber Sep 2017 - Sep 2018San Francisco, California, UsPromoted in Sept 2017, I took on additional responsibility of managing a global team for third party security assessments.I worked as a security advisor to Money Engineering.I led security and compliance related matters related to Uber's operations in South East Asia leading to a smooth disinvestment. -
Sr Security StrategistUber Jan 2016 - Aug 2017San Francisco, California, UsPayments Security Leader for Uber GloballyStarted and scaled Vendor Security Management to a world class team which I manageAdvisor to mergers and acquisitions at Uber from a payments security perspective.Strategic Global problem solver - wherever neededA Bar raiser (expert interviewer). Among 3% Uber employees who are bar raisersLed Uber's PCI DSS 3.2 Certification Project to successful result on time.Co-Founder and Co-Chair of Uber Immigrants ERG (Employee Resource Group) One of the top Employee driver partners of Uber, drove for charity and understood the security aspects from a driver's perspective.Got promoted to the current level in Sept 2017. -
Adjunct Professor Of Computer ScienceSan Jose State University 2017 - 2019San Jose, Ca, UsSpring 2018: Designed and taught a Graduate level security course: CMPE 279-Software Security Technologies. The MS Software Engineering with Specialization in Cybersecurity (MSSE-Cybersecurity) program is the only recognized CAE Curriculum Path by NSA/DHS for SJSU. CMPE 279 is recognized as one of the key courses of the MSSE-Cybersecurity program.Spring 2019: Taught CMPE 279-Software Security Technologies after huge success of the 2018 teaching (based on student feedback). Some great security minds including RSA President Rohit Ghai were kind enough to visit my classroom as guest speakers.In April 2019, was awarded Best Practices in Teaching Award for Diversity Equity and Inclusion by SJSU.I have also advised a group of students for their M.S. project focussed on security. -
Advisory CisoCloudoptics.Io 2017 - 2019East Brunswick, New Jersey, UsCloudOptics is a comprehensive Security Platform for the Enterprise. The product detects, remediates and alerts continuously about security issues. It helps manage continuous compliance such as HIPAA, PCI, ISO 27001.My role was domain advisory for security and compliance.CloudOptics was awarded "Security Company of the Year 2018" at the Dynamic CISO summit 2018. It also won the Aegis Graham Bell Award 2018 in the “Innovation in Cloud” category.https://cloudoptics.io -
Security And Compliance StrategistAdobe 2014 - 2016San Jose, Ca, UsLed the Security Compliance efforts for Adobe Document Cloud, and responsible for the following product/service certifications: PCI DSS 3.1, ISO 27001:2013, SOC2 Type2, and more. -
Senior Member Of Technical Staff (Security Products Development)Oracle Usa 2006 - 2014Austin, Texas, UsWorked in product development of Oracle Identity Management, the cutting edge security product by Oracle.• Design and Development of Oracle Access Manager product• Successfully delivered the OAM 11gR2 release• Experience with Single Sign On, Cloud security, Federation and Access ControlWorked on Oracle Beehive product on Zimbra integration with Beehive. It is one of the largest Oracle Real Application Clusters deployments in the world.Previously worked on Oracle BAM (Business Activity Monitoring) development, which is one of the pillars of Oracle's Fusion Middleware. -
Instructor Of Java SecurityUcsc Extension Silicon Valley Jan 2012 - Dec 2012Santa Clara, California, UsDesigned a new course on Java Security from scratch and taught it for two semesters.Catalog: http://www.ucsc-extension.edu/sites/default/files/imce/public/pdf/ENG_TECH_Fall2012.pdf(Java Security on Page 20) -
InvestorTurant Inc. Jan 2008 - Dec 2009Turant is a AI based secure, scalable, and affordable solution for biometric verification. The application potential is tremendous for Fintech, law enforcement and other businesses. -
Graduate AssistantTexas A&M University Dec 2003 - Oct 2005College Station, Tx, UsGraduate Assistant, International and European Union Center, at the George Bush Presidential Library, Texas A&M University, College StationOrganized a major event involving diplomats of over 50 countries including those from China and Taiwan which in itself was a big learning in diplomacy and communications. -
Software EngineerPerot Systems Sep 1999 - Jul 2003Round Rock, Texas, UsSoftware Development, System Analysis, Business Process Reengineering, Client relationship management.On Deputation at Perot Systems, Singapore, worked for CPF Board - the social security organization of Singapore and performed project coordination across geographies in a multi cultural settingWorked for two years at client location Singapore, multitasking with different roles – Software development, managing customer relations and coordination among the customer in Singapore, developers located in India and third party experts in AustraliaImplemented a storage solutions project with disaster recovery and Business continuity planning components
Shreyas Kumar Skills
Shreyas Kumar Education Details
-
Texas A&M UniversityComputer Science And Engineering -
Texas A&M UniversityCybersecurity Law And Policy -
Texas A&M UniversityComputer Science -
Mays Business School - Texas A&M UniversityBusiness -
Uc Berkeley ExtensionBlockchain Technology -
Harvard Business SchoolLeadership And Strategy -
University Of California, Santa CruzComputer Science (Phd Coursework) -
Indian Institute Of Technology, Roorkee -
Sainik School PuruliaScience And Mathematics
Frequently Asked Questions about Shreyas Kumar
What company does Shreyas Kumar work for?
Shreyas Kumar works for Texas A&m University
What is Shreyas Kumar's role at the current company?
Shreyas Kumar's current role is Professor of Computer Science.
What is Shreyas Kumar's email address?
Shreyas Kumar's email address is k_****@****hoo.com
What is Shreyas Kumar's direct phone number?
Shreyas Kumar's direct phone number is +165076*****
What schools did Shreyas Kumar attend?
Shreyas Kumar attended Texas A&m University, Texas A&m University, Texas A&m University, Mays Business School - Texas A&m University, Uc Berkeley Extension, Harvard Business School, University Of California, Santa Cruz, Indian Institute Of Technology, Roorkee, Sainik School Purulia.
What are some of Shreyas Kumar's interests?
Shreyas Kumar has interest in Cooking, Traveling, Education, Photography, Sailing, Creative Writing.
What skills is Shreyas Kumar known for?
Shreyas Kumar has skills like Software Development, Cloud Computing, Java, Security, Information Security, Enterprise Software, Network Security, Disaster Recovery, Cloud Security, Cryptography, Cissp, Java Enterprise Edition.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial