HOME LAB : HANDS-ON
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
Impact & Insights
SECUR-TAINMENT
Strategic oversight and risk mitigation.
Protecting digital assets and data.
Ensuring excellence and compliance.
Achieved full success in CMMI, TL9000, ISO 9001:2015, and AS9100 certifications.
Developed and put in place strong plans to reduce risks across various projects.
Built models using data to find trends and improve processes.
Streamlined testing processes using efficient methods, leading to better quality.
Trained three junior team members, helping them grow in quality roles.
Checked suppliers for security gaps against ISO 27001:2013 standards.
Governance
Risk Management
Compliance
Information Security
Internal Auditing
Data Analysis
People Management
These are core skills I’ve built over the years in governance, risk, compliance, and quality assurance. They apply well to cybersecurity and help in adapting quickly, understanding security needs, and supporting compliance across systems and processes
Important for finding weaknesses, understanding threats, and fixing security issues.
Explain technical risks simply, write clear reports, and work well with others.
Find small issues, wrong setups, and hidden signs of problems.
The security world changes fast. Learn new tech and threats quickly.
Team up with IT, development, legal, and business groups for full security.
Understand what's right and wrong in security actions. Keep high integrity.
Nottingham Trent University (2024)
National Law School of India University (2019)
Anna University, Chennai (2007)
Explore practical projects where I've applied my skills in cybersecurity and related fields.
Created dashboards for data visualization and monitoring.
Performed security audits to identify and address vulnerabilities.
Implemented strategies for identifying, assessing, and mitigating risks.
Applied ISO standards for information security management.
Ensured quality management in aerospace industry standards.
Conducted mobile device forensic investigations.
Performed penetration testing to find security flaws.
Set up and managed a Kali Linux server on Raspberry Pi.
Explored ethical hacking techniques for security testing.
Developed and designed responsive web pages.
Used Ventoy for PC troubleshooting and automation.
Applied DevOps principles for Virtual machine Configurations.
Focused on network and cloud security implementations.
April 2024 - Present
Installs and fixes computer systems, networks, and software. Handles basic tech support.
September 2022 - September 2023
Created security policies, checked supplier security, and found system weaknesses.
March 2015 - December 2021
Led teams to achieve quality certifications (CMMI, ISO, TL9000, AS9100). Tracked performance and managed risks.
May 2014 - December 2014
Improved testing processes, created templates, and performed quality checks.
August 2010 - March 2014
Managed account quality, led process improvements (Lean Six Sigma), and ensured team followed rules.
August 2007 - August 2010
Helped set up quality systems (CMMI), joined leadership meetings, and audited client projects.
In today's digital world, GRC (Governance, Risk, Compliance) and InfoSec (Information Security) work closely together. My 16+ years of experience helps combine strong security with business goals and rules. This combined approach is key for strong organizations today.
Dealing with different rules and quality standards can be hard. I have a proven record of success in certifications like ISO 9001:2015, ISO 27001, CMMI, TL9000, and AS9100. This shows I can improve and comply with rules in many business areas. This skill makes me stand out.
My journey from software quality and compliance roles into IT security assurance reflects how closely quality and cybersecurity now work together. With a strong foundation in quality frameworks and risk management, I’ve naturally progressed into roles focused on identifying system vulnerabilities and strengthening controls. This shift shows how industry demands are evolving—security isn’t just about tools, it’s about embedding secure thinking into every process. My background helps me approach cybersecurity with both structure and practicality.
Comments
Post a Comment