Roles & responsibilities:
Digital Platform Program: Payments and Cards security
Led the Bank’s Payments and Cards Programs from a Security Architecture perspective, covering requirements gathering, embedding secure by design into complex business and technological solution building blocks, which includes VISA Card journeys - PCI DSS controls, and SEPA Instant Payments.
Key Outcomes:
- Designed security controls for the complex solution that covers, Network Security, Application Security: Container Security on Redhat Openshift, API Security, platform security and Core Infra Security.
- Designed multi-channel api access from mobile app covering PSD2 usecases for SCA - Oauth2 & OIDC based Authoriation patterns
- Develop Threat model for the complex application access usecases using interactive STRIDE threat assessment.
The DORA Compliance project
Key Outcomes:
- Discovery, Identification, documentation and presentation of white paper that addresses key gaps within the Security Domains Network Security, Platform/Infrastructure Security, IAM & Applications Security covering DORA compliance articles.
- White paper covering: Zero Trust Strategy that looks at all the pillars: Identity, Network, Devices, Data, and Application workloads required for aligning the DORA articles: Network Segmentation - Micro segmentation for on-premises and cloud service access, IAM covering access management for internal and external facing sensitive apps, privileged access solution, asset security integration, endpoint security - windows and Mac devices, mobile app security.
- Create PoV projects for network segmentation for North-South and East-West access, with principles such as Security through obfuscation for hiding critical bank asset via Single Packet Authorization technique for protecting North-South digital access. Key Outcomes: Define Problem Statements and scope usecases, create Business case and design for architecture review perform POC and implement technology that implements the overall design.
Cyber Program - Cloud Security Readiness & Response.
Cloud Security Architecture - aligning with SABSA framework (Contextual, Conceptual, Logical, Physical and Operational) and NIST SP 800.53 controls,
Key Outcomes:
- Security Architecture, for various usecases within the bank’s Secure-by-design forum, which includes, the bank’s Public and Private Cloud Architectures covering – MS Azure IaaS, PaaS services, with bare metal Kubernetes on Redhat Openshift Cluster; Zero Trust architecture, that looks at implementing requirements such as Dark network East-West traffic access protection using Identity based segmentation,
- Least privilege at all times, supporting both East-West and North-South traffic flows ( Tools in Use: North-South AppGate SDP And ZScaler Zero Trust Exchange, and East-West – Elisity Identity Graph).
- Develop Cloud Design Governance and Risk Management – Defining Cloud native IaaS & PaaS Security Controls definitions and Implementation of the controls through the Bank’s DevOps frameworks. Ensure that the Security Controls are aligned to the Security Architecture Framework implemented as part of the CISO’s governance framework.
- Create enterprise-wide Secure Patterns, that looks at various use cases, including, Data Security, network segmentation ( SP 800-215) and isolation; IAM – SP-800 63, application-level controls such as implementing API security with OWASP, ASVS, Mobile App, MASVS, PKI, Secrets Management, Network routing and monitoring and security requirements.
- Led efforts to achieve relevant certifications such as ISO 27001, demonstrating the organization''s commitment to maintaining a secure environment.
- Played a key role in the successful completion of multiple mergers and acquisitions by integrating disparate IT infrastructures securely and efficiently.