0% found this document useful (0 votes)
28 views3 pages

Vi Krant Puranik: Contact Profile

Uploaded by

ahmedpashak303
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views3 pages

Vi Krant Puranik: Contact Profile

Uploaded by

ahmedpashak303
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

VIKRANT PURANIK

Contact Profile
Experienced Techno-functional leader with a continuous learning attitude, having 13
(+91) 7768867678 years of experience & leading a multidisciplinary security team. Skilled in securing SaaS
& On-prem environments with focus on Cloud Security, Container/K8s Security,
puranik.vikrant@gmail.com DevSecOps, Security Architecture, Security Operations etc.

Professional Experience
B6/102, Alcon Renaissant,
Kharadi, Pune, MH 411014
MANAGER-CLOUD SECURITY OPERATIONS AUG 2020
TRACELINK,INC – Pune, MH – Present
linkedin.com/in/vikrant-
puranik-cissp-b9544229  Established the India cloud security & corporate security team, currently leading
and managing the cloud security function and reporting to CISO.
 Develop and maintain security strategy and goals in line with Business for
Education Tracelink’s SaaS environment.
 Regularly assess KPIs for security, prepare data-points for Management Review
(Jun 2011) meetings.
Bachelor of Engineering in  Implemented and operationalized the various cloud-native security services such
as GuardDuty, SecurityHub, Config, Inspector etc. for the workloads hosting SaaS
Computer Science,
applications.
Nagpur University
 Implemented cloud security posture management (CSPM) to identify insecure
– Nagpur, MH configurations, compliance risks & track vulnerable assets in cloud environment.
 Undertaken various security initiatives as IAM policies fine-tuning, K8S RBAC,
granular firewall rules for egress/ingress traffic, best practices for security logging
Key Skills  Implemented in-house security observability tooling on AWS and integrated
logging of various cloud native security services.
Cloud Security(AWS)  Implemented tooling and operationalized process for conducting vulnerability
assessment against cloud workloads such as EC2 servers, Container Images.
Container Security  Operationalize “Infrastructure-as-Code” (Terraform, Helm charts) security
scanning & integrated the same with Jenkins CI/CD Infra pipelines.
Security Architecture/Reviews  Regularly participate in new systems design & architecture (HLD, LLD) review
discussions to ensure security is “baked” in the system.
Vulnerability Management  Partner with DevOps, CloudOps and SRE for DevSecOps strategy.
 Implemented kubernetes security controls such PSP, service-mesh, control-plane
Security Operations security logging & worker-nodes hardening in Microservices environment.
 Stakeholder for ISO 27001 & SOC 1/2 compliance and part of the ISO Internal
Cyber Security Frameworks
advisory team for ensuring proper controls are implemented.
(NIST 800-53, MITRE, CSA CCM)
 Participate, represent Cloud-Sec in the Third-party Risk assessment & Tracelink’s
DevSecOps, IaC Security customer audits.

Network Security DEPUTY MANAGER-INFORMATION SECURITY JUN 2016


SEARS HOLDINGS INDIA – Pune, MH –AUG 2020
Kubernetes Security
 Responsible for managing the team for security operations, threat management
Cloud Security Posture and cloud security.
Management(CSPM)  Participate in cloud migration discussions, formulate the various security &
compliance processes for AWS & GCP migration.
ISO 27001, SOC 1/2 Compliance  Conduct awareness session with different stakeholders about the newly
implemented controls and requirements.
Certifications  Managing Splunk environment and Integration of the AWS infrastructure logging
in Splunk, create custom dashboard, searches & alerts for any potential security
Certified Information Systems incidents.
Security Professional (CISSP)  Provide guidance on security & implement security controls on the AWS & GCP
environment.
 Implement server hardening process based on CIS benchmark policy & provide
GIAC Public Cloud
expert knowledge to the infrastructure team to meet the requirements.
Security(GPCS)  Integration of security tools in CI/CD pipeline & automated security scanning of
newly built container images.
Certified Kubernetes Security  Participate in the new applications Threat modelling and suggest software design
Specialist (CKS) changes.
 Conducting security assessment for the project migration to cloud infrastructure
Certified Kubernetes (AWS, GCP) such as firewall rules or security group review, system hardening,
vulnerability detection and remediation, containers images security assessment
Administrator (CKA)
etc.
 Conducting internal assessment for PCI-in scope infrastructure to ensure policies
Tools/Technologies are implemented as per the compliance requirements.
 Participate in the critical security incident response process, log analysis, co-
Prowler, Checkov ordinate with various stakeholders for remediation and documenting RCA.

Wazuh, ElasticSearch INFORMATION SECURITY SPECIALIST MAY 2014


IBM INDIA – Pune, MH – JUN 2016
Tenable.io, QualysGuard
 Working as the subject matter expert(SME) for SIEM solutions.
Jenkins, Cloud Custodian  Handle different SIEM solutions for multiple clients & SOC environments.
 Handling a team of four L1 & two L2 security engineers in Centralized Security
AWS Inspector, AWS ECR Operations Centre located in Bangalore.
 Responsible for new deployment, configuration of SIEM solutions for new &
AWS GuardDuty, S3 Security existing clients.
 Fine tuning current SIEM environment of customers, creating use-cases &
AWS IAM, AWS SecurityHub improving capabilities of SIEM operations.
 Integration of IT infrastructure with SIEM solution, creating correlation alerts,
Control Tower, AWS Config custom reports for the critical systems & maintain log retention as per compliance
requirements.
AWS Organizations, AWS SSO  Creating & updating SOP documents for SIEM & other security products such as
Imperva, NIPS etc.
AWS WAF, Firewall Manager  Analysing the suspected traffic through Imperva & creating the custom rules to
block the suspicious & malicious incoming traffic through WAF.
CIS Benchmarks  Maintain vulnerability management program such as scanning, tracking &
remediation of vulnerabilities identified on critical systems till closure by Co-
MS Threat Modelling Tool coordinating with client SPOC & various other teams.
 Maintaining enterprise security dashboard with the help of SIEM solutions, VA
Linux Systems Hardening tools etc.
 Performing maintenance activities such as health-checks, backup, & updates for
IBM QRadar, Splunk SIEM & Imperva.
 Actively participate in internal security audits as well as external security audits.
IDS/IPS, McAfee EPO, Websense  Ensuring PCI-DSS compliance for the client with the help of various security tools
Proxy & policies.
 Provide training to junior resources on various security products & policies.
Terraform, Helm Charts, Cloud
Formations INFORMATION SECUIRTY ANALYST DEC 2014
SUNGUARD SOLUTIONS – Pune, MH - MAY 2014
EDR Solutions

 Fine-Tune existing QRadar setup for efficient security operations.


 Responsible for creating custom regex, reports, correlation rules & offenses.
 Performing active role in new QRadar deployment planning, implementation, log
source integration & performance tuning.
Trainings  Responsible for creating KB documents & SOC service scope documents.
 Gather, understand & implement the requirements of customer for SOC
Cloud Security Alliance (CCSK) operations.
 Participate in the quarterly Table-top-exercises and corporate security audits.
AWS Security Specialty  Participate in security tools POCs and product evaluation.

SANS Public Cloud Security


ASSOCIATE SECURITY CONSULTANT JAN 2013
Kubernetes: Package PALADION NETWORKS – Pune, MH – DEC 2013
Management with Helm

Microservices: Security  Deputed as Single Point of Contact (SPOC) for SIEM administration at client
location.
 Involved in the end-to-end SIEM implementation, upgrade & migration activities.
Personal Details  Integration of various log sources such servers, network devices, security devices
and critical applications with SIEM.
Date of Birth: 11-Oct-1989  Configuring, modifying, fine-tuning correlation rules to identify suspicious
activities in the client network by means of security alerts
Nationality: Indian  Configuring dashboard and ad-hoc reports according to client requirements
 Update NIPS signatures and whitelist IPs on the client network
Marital Status: Married  Blocking the unwanted, malicious websites and creating the user group policies on
Websense proxy.
Visa Status: Valid US B1/B2 Visa  Preparing, updating SOP document for security tools
 Performing active role and work with incident management team during security
incident for investigating the incident root-cause
 Contribute in the preparation of root-cause analysis (RCA) report of security
incident

JUNIOR SOFTWARE ENGINEER SEP 2011


ZENSAR TECHNOLOGIES LTD. – Pune, MH – DEC 2012

 Member of Global Security Operations Center in Zensar Technologies


 Perform real-time analysis of events, create weekly, monthly security reports
 Integration of log sources such as Network devices, Servers etc. with SIEM
 Review security alerts and raise incidents if needed for escalation
 Create and fine-tune correlation rules to reduce false positive
 Scanning Servers, Desktops and network devices for vulnerabilities using Nessus

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy