Engagements

Professional Footprints



Product Security Lead
Collaborating extensively with global VPs, CISOs, BISOs, and cross-functional leadership teams to define, implement, and scale Product Security processes across the organization. Driving alignment between engineering, compliance, and risk management functions to ensure a unified, proactive, and risk-informed approach to enterprise security. Actively promoting secure-by-design principles, security governance, and continuous improvement in security posture across product lifecycles.

Digital Creator
Cyber Voyage is on a powerful mission — to spread Cyber Security Education and Ethical Hacking Awareness in Classical Tamil, making complex digital safety topics simple, practical, and accessible to everyone. With a growing army of 350,000+ Cyber Warriors, this channel is building a strong, security-aware community across Tamil-speaking regions.



Threat Advisor
Actively involved in both offensive and defensive cybersecurity operations, I specialize in designing and implementing robust strategies to protect the organization from ever-evolving cyber threats. My work spans multiple layers of security—network, application, endpoint, and cloud—ensuring a comprehensive defense against vulnerabilities and attacks. I proactively identify risks, simulate potential threats, and fine-tune security protocols to stay ahead of malicious actors.

Security Consultant
I led the automation of vulnerability remediation through our ticketing platform, streamlining the entire process to boost both security and operational efficiency. This allowed for faster response times and reduced manual effort, ensuring critical issues were addressed without delays. Beyond automation, I played a key role in managing core components of our cybersecurity program — including Cloud Security Posture Management (CSPM), Identity and Access Management (IAM), and Qualys-based vulnerability management.



Assistant Manager
I’ve conducted comprehensive Vulnerability Assessments across a range of platforms, including Web, Mobile (Android & iOS), and Thick Client applications. My work extended to performing Internal and External Penetration Testing, detailed Network Configuration Reviews, and high-impact Red Team Assessments that simulated real-world attack scenarios to test organizational defenses. Each assessment was tailored to uncover critical weaknesses and provide actionable insights.

Security Specialist
Actively handled and managed various security breaches and attack incidents, ensuring swift and effective responses to minimize impact. My role involved analyzing and collecting logs from multiple security systems including IDS (Intrusion Detection Systems), IPS (Intrusion Prevention Systems), and SEP (Symantec Endpoint Protection).



Security Analyst
Conducted in-depth Vulnerability Assessments across Web, Mobile, and Enterprise Network environments, identifying a wide range of security gaps. My assessments uncovered critical issues such as application-level vulnerabilities, broken mobile session authentication, insecure data storage, exposed IoT device flaws, and missing OS patches. Each finding was documented with clear, actionable recommendations to help strengthen the client’s security posture.

Quality Analyst
Performed comprehensive Application Security Assessments aligned with the OWASP Top 10 to strengthen the security of both Web and Mobile applications. Additionally, conducted Vulnerability Assessments across Web platforms, Mobile environments, and Enterprise networks, identifying a wide range of security issues. Key findings included application vulnerabilities, broken mobile session authentication, insecure data storage, IoT device exposures, and unpatched operating systems.

