Summary
Overview
Work History
Education
Skills
Websites
Timeline
Generic

Umesh Kumar Dommati

Jersey City,NJ

Summary

Dynamic Cyber Security Engineer with a proven track record at GE, specializing in Cloud Security and Risk Analysis. Expert in implementing NIST frameworks and enhancing security postures through innovative solutions. Adept at collaboration and leadership, driving successful security programs that safeguard organizational assets and mitigate risks effectively. Strategic professional skilled in risk assessment and penetration testing. Oversees firewall installation and data encryption to reduce vulnerabilities. Safeguards company data through the stringent enforcement of security protocols. Highly skilled Cybersecurity Engineer with comprehensive understanding of network architectures, security protocols, and risk assessment methodologies. Proven strengths include vulnerability analysis, threat mitigation and cyber incident response. Demonstrated impact in previous roles includes successful implementation of sophisticated security solutions to safeguard company data and infrastructure.

Overview

10
10
years of professional experience

Work History

Cyber Security Engineer

GE
Cincinnati, OH
11.2023 - Current
  • Led the implementation of the NIST Cybersecurity Framework to enhance the organization's overall cybersecurity posture.
  • Work closely with product and platform teams to engineer and implement Cloud security controls with a focus on DevSecOps.
  • Configuration of Windows 10 Laptops, Server 2008R2, 2012, Red Hat and VMWare vSphere environment with DIACAP hardening.
  • Led the design, deployment, and ongoing management of CyberArk EPV version 11.x to enhance the organization's privileged access security.
  • Identify recommendations in Azure Security Center and GCP Security Command Center and Implement as required.
  • Act as a Subject Matter Expert (SME) for designing and architecting solutions, anticipating future growth, and implementing new functionalities.
  • Build, maintain and manage central security policies for Azure cloud infrastructure.
  • Azure Security Center monitoring to address threats and resolve security vulnerabilities.
  • Provided expert troubleshooting and support for Palo Alto Networks devices. Developed, maintained, and reported on key cloud security metrics, offering thought leadership on cloud usage strategy.
  • Defined and managed AWS Security Groups and Network ACLs, implemented CI/CD pipelines using Jenkins and Kubernetes. Developed build and deployment scripts using Maven, integrated SonarQube in Jenkins, and configured AWS IAM and Security Groups.
  • Implemented and maintained AWS security instances, developed security roadmaps, and established security group strategies.
  • Utilized Cloud Formation, Terraform, Ansible, Python, and Bash Scripts for building solutions from AWS components.
  • Implemented and maintained DevSecOps practices to seamlessly integrate security controls into the entire Software Development Life Cycle (SDLC).
  • Setup Alerting and monitoring using Stack driver in GCP.
  • Managed and maintained existing key management infrastructure, executed upgrades, and explored current key management technologies.
  • Migrated platforms to new cloud servers, configuring multi-factor authentication (MFA) solutions to ensure secure access.
  • Implemented feedback loops and conducted thorough debriefs after red team exercises.
  • Collaborated with cross-functional teams to integrate CyberArk with JDK 1.6/1.7, J2EE, and JDBC technologies, ensuring seamless authentication and authorization processes.
  • Demonstrated leadership in orchestrating effective incident response procedures as part of the Blue team.
  • Implemented and manage cloud security measures, including automation, AWS deployments, EC2, Lambda, S3, RDS, DynamoDB, Cloudwatch, CloudFormation, MFA, IAM, VPC, CloudFront, and Route 53.
  • Implemented and managed Information Security programs to safeguard organizational assets.
  • Aligned security policies, procedures, and controls with the NIST framework to ensure a comprehensive and standardized approach to cybersecurity.
  • Monitored and analyzed network traffic using Palo Alto Networks tools to detect and respond to potential security threats.
  • Configured and fine-tuned the platform, ensuring optimal performance and adherence to cybersecurity best practices.
  • Implemented and maintained DevSecOps practices by integrating security controls and automated vulnerability scanning into the continuous integration/continuous deployment (CI/CD) pipelines.
  • Proficient in leveraging threat intelligence to enhance blue teaming capabilities. Integrated real-time threat intelligence feeds into security operations.
  • Orchestrated comprehensive security awareness training programs for healthcare staff, ensuring a culture of cybersecurity vigilance throughout the organization.
  • Implemented secure workflows and policies within CyberArk EPV, enforcing the principle of least privilege and mitigating potential security risks.
  • Interacted with business units to implement Enterprise Key Management (EKM) programs, provided thought leadership on encryption key management, application architecture integration, and data loss prevention.
  • Built new architecture in various environments while ensuring adherence to security principles.
  • Guided the cloud security group, driving improvements and collaborating with security architects on cloud security frameworks.
  • Ensured compatibility and interoperability of IAM protocols with CyberArk EPV, fostering a cohesive and standardized approach to identity management.
  • Conducted thorough security assessments and audits to validate the robustness of the IAM integrations, identifying and mitigating potential vulnerabilities.
  • Led large-scale programs for deploying and managing cloud security appliances and agents, addressing risks.
  • Wrote bash and Python scripts, integrated Boto3 for automation tasks, and performed data analytics using ELK for logging and monitoring.
  • Configure and maintain robust Network Security measures to protect against unauthorized access and cyber threats.
  • Conduct Cyber Threat Intelligence analysis to stay informed about potential risks and vulnerabilities.
  • Designed and implement effective Security Architecture for systems and networks.
  • Conducted thorough risk assessments following NIST Special Publication 800-30 guidelines.
  • Lead and coordinate Incident Response efforts to promptly address and contain security incidents.
  • Managed day-to-day Security Operations, including monitoring and analyzing security alerts.
  • Implemented and monitored Google Cloud (GCP) Secret Management using KMS.
  • Implemented Identity and Access Management (IAM) solutions to control user access and privileges.
  • Collaborated with application and infrastructure teams to design and architect secure cloud and data center solutions.
  • Environment: AWS, ELK Stack for Data Analytics, NIST, GCP, Azure, Python Scripting, Bash Scripting, Boto3 Automation, Security, Roadmap Development, Security Group Strategy Establishment, Palo Alto, Cloud Formation, Terraform, CI/CD, Network ACLs Management.

Information Security Administrator

Gieco
Chevy chase, MD
05.2022 - 10.2023
  • Validated full agent deployment to enhance network security coverage.
  • Implemented and monitored GCP Cloud monitoring and Logging (Stackdriver).
  • Configured Pub/Sub to send logs from Google Cloud (GCP) to IMB QRADAR and Splunk using Terraform.
  • Developed and executed risk mitigation strategies based on the NIST framework to address identified vulnerabilities and threats. Fine-tune scan performance to optimize vulnerability detection efficiency.
  • Enabled Active Directory and MFA login for InsightVM to strengthen authentication mechanisms.
  • Spearheaded the integration of XML, SAML 2.0, and other industry-standard IAM protocols into the cybersecurity infrastructure.
  • Used AWS Config to analyze the Cloud infrastructure and build Auto Remediation for configuration drifts that are out of compliance.
  • Identify risks and vulnerability reported in Azure security center and GCP Security Command Center and remediate them.
  • Implemented all aspects of Google Cloud (GCP) Security including IAM Roles, User and Group Management, 2SV/MFA.
  • Established key performance indicators (KPIs) and metrics to measure the effectiveness of blue team activities.
  • Integrated threat intelligence feeds into DevSecOps processes, enhancing the ability to proactively identify and mitigate emerging threats before they impact the organization.
  • Created CIS Level 1 Benchmark scans and sample CIS reporting for servers and workstations, generating reports that specifically address missing patches and misconfigurations for proactive risk management.
  • Applied cryptographic techniques to secure sensitive data and communications.
  • Established and maintained a continuous monitoring program in accordance with NIST Special Publication 800-137 to promptly detect and respond to security incidents.
  • Experience in Implementing Security Hub, Guard Duty, Trusted Advisor, Access analyser, AWS Shield, WAF, CloudTrail and CloudWatch.
  • Exercised implementing Tagging resources in AWS Accounts and used these tags for auditing, cost exploration and security remediate actions.
  • Investigated Azure Security Center integration for seamless cloud security infrastructure, designed and implemented Cloud Security Infrastructure for Azure applications, ensuring robust protection.
  • Monitored Azure Security Center for threats and promptly resolved security vulnerabilities.
  • Defined and implemented security frameworks, along with monitoring, metrics, and logging solutions.
  • Worked closely with development teams to establish secure communication channels between applications, leveraging XML for data exchange and SAML 2.0 for single sign-on (SSO) capabilities.
  • Ensured Cloud Security by implementing and monitoring security controls in cloud environments.
  • Conducted Application Security assessments to identify and remediate vulnerabilities in software applications, ensuring compliance with security standards and regulations through Security Compliance measures.
  • Developed and delivered Security Awareness and Training programs for staff.
  • Developed and maintained documentation for Palo Alto Networks configurations and policies for future reference.
  • Implemented and oversaw Vulnerability Management programs to identify and remediate security vulnerabilities.
  • Managed Endpoint Security solutions to protect devices from malicious activities.
  • Configured and manage Firewall solutions to control and monitor network traffic.
  • Ensured compliance with NIST Special Publication 800-53 by implementing and managing security controls.
  • Developed Automation Pipeline in AWS to Remediate Security incidents using different AWS services like AWS lambda, cloud watch, cloud trail and scripting like python and groovy script.
  • Keep vulnerability and EOL dashboards updated for real-time visibility into security posture.
  • Participated in the planning and execution of Palo Alto Networks software updates and patches.
  • Developed goals, SLA targets, and reporting mechanisms, recommending automated workflows for efficiency.
  • Integrated with Divvy Cloud for centralized security policy management and enforcement.
  • Verified credential scanning for Windows and Linux systems for comprehensive vulnerability assessment.
  • Environment: PERL, RUBY, Docker, Security Frameworks, NIST, AWS, Route 53 Security, VPC Security, IAM, DynamoDB, S3 Security, Azure, GCP, Automated Cloud Deployments, Palo Alto, Lambda, CIS Reporting, Scanning Policy Review, MFA.

Peoplesoft and IAM Security Administrator

AT&T
College Station, TX
01.2020 - 04.2022
  • Developed, maintained, and troubleshoot Peoplesoft roles in IAM to ensure synchronization with databases.
  • Addressed access and security issues for KRONOS in HCM and Workforce Management domains.
  • Lead the migration of security roles and permissions in Peoplesoft using STAT for streamlined management.
  • Managed Peoplesoft HCM, ELM, and FSCM user accounts, groups, roles, and security privileges.
  • Implemented NIST Special Publication 800-50 guidelines to develop and deliver comprehensive cybersecurity awareness training programs for employees.
  • Implemented Palo Alto Networks Panorama for centralized management and monitoring of firewall policies.
  • Executed security measures to safeguard sensitive data and information across the organization.
  • Collaborated on Security Policy Development to align with industry best practices and standards.
  • Conducted regular Security Audits and Compliance checks to meet regulatory requirements.
  • Developed and maintain an effective Incident Response Plan for addressing security incidents promptly.
  • Established and maintain robust Access Controls to prevent unauthorized system access.
  • Collaborated with Palo Alto Networks technical support to resolve complex issues and optimize network security infrastructure.
  • Lead Security Awareness campaigns to educate employees on cybersecurity best practices.
  • Coordinated with cross-functional teams to integrate Identity and Access Management solutions.
  • Conducted thorough Risk Assessments to evaluate potential cybersecurity threats and vulnerabilities.
  • Implemented and manage Firewall rulesets to control inbound and outbound network traffic.
  • Configured and monitor Intrusion Detection and Prevention Systems for early threat detection.
  • Manage user badge expiration and renewal in Identity and Access Management (IAM) for enhanced security.
  • Perform annual user re-certification of Peoplesoft roles and security privileges for compliance.
  • Create, maintain, and troubleshoot IAM user accounts, groups, roles, and security privileges.
  • Lead Contractor-Employee conversions of users in Identity and Access Management (IAM).
  • Provided administrator support for IAM server, including rebooting and troubleshooting web, app, and database servers.
  • Utilized COGNOS for reporting and monitoring metrics related to IAM for informed decision-making.
  • Manually re-assign approval requests and tasks in IAM workflow portal for efficient task management.
  • Managed user accounts, groups, roles, and security privileges in Maximo for streamlined access control.
  • Address IAM Production Queries and resolve them promptly for uninterrupted operations.
  • Managed Entrust Identity Guard VPN tokens, including creating, maintaining, and troubleshooting user accounts, groups, roles, and security privileges.
  • Coordinated with data owners on Peoplesoft FSCM role descriptions and approvals for accurate access control.
  • Review RFP, POC, and SOW for project roadmaps and compliance with security standards.
  • Provided tier 2 security support for Escalated User Privileges (EUP) requests across Confidential infrastructure.
  • Created project plans and offer project forecasts through graphs using MS Project for effective planning.
  • Acquired required approvals and track agile project progress using JIRA.
  • Environment: IAM, Database Synchronization, KRONOS Security Management, HCM, Security Roles Migration, Peoplesoft Permissions Management, STAT, Data Safeguarding, Security Policy Development, NIST, Troubleshooting, COGNOS, VPN, Peoplesoft FSCM Security, Palo Alto, RFP POC, SOW, MS Project, Agile JIRA.

System Administrator

Charter Communication
St Louis, MO
03.2018 - 11.2019
  • Collaborated with stakeholders to establish system specifications, considering user requirements and security needs.
  • Planned and executed the selection, installation, configuration, and testing of hardware, software, and network systems for robust cybersecurity infrastructure.
  • Monitored and analyzed system performance, troubleshoot issues, and perform tuning for optimal operation.
  • Lead Security Operations Center (SOC) activities, ensuring continuous monitoring and analysis of security events.
  • Provided expert guidance on Security Architecture design and implementation for a secure system environment.
  • Collaborated with developers to integrate secure coding practices, emphasizing Application Security.
  • Utilized encryption methods to secure data at rest and in transit, ensuring data confidentiality.
  • Implemented and managed Cloud Security measures to safeguard assets in cloud environments.
  • Conducted periodic Penetration Testing to identify and address potential security vulnerabilities.
  • Oversaw Endpoint Security solutions, ensuring protection against malware and unauthorized access.
  • Developed and maintained a comprehensive Vulnerability Management program for proactive threat mitigation.
  • Monitored security-related incidents and coordinated Incident Response activities for timely resolution.
  • Stayed abreast of emerging threats and technologies, adapting cybersecurity strategies accordingly.
  • Designed and conducted system load/stress testing, escalating and resolving application problems.
  • Secured the system by developing access controls, monitoring, and evaluating security measures.
  • Environment: Stakeholder Collaboration, System Specification, User Requirements Analysis, Security Needs, Assessment, Hardware Selection, Software Installation, System Configuration, System Testing.

Network Analyst

HSBC
India
06.2015 - 08.2017
  • Conducted IT controls risk assessments that included reviewing organizational policies, standards, procedures and guidelines.
  • Conducted network control assessment to assess adequacy of management, operational, and technical network controls implemented.
  • Assisted in development of Information Security Continuous Monitoring Strategy (Ensure continued effectiveness of all security controls), vulnerabilities, and threats to support organizational risk management decisions.
  • Developed system security plan (SP) to provide overview of federal information system security requirements (FISMA) and describe controls in place.
  • Conducted walk through, formulated test plans, documented gaps, test results, and exceptions; and developed remediation plans for each area of testing.
  • Performed IT operating effectiveness tests in areas of networking, operations, change management, and email authentication.
  • Developed audit plan and performed General Computer Controls testing, identified gaps, developed remediation plans, and presented final results to IT Management team.
  • Conduct IT general controls risk assessments as well as risk auditing with frameworks like HIPAA, PCI and ISO 27001.
  • Designed monitoring tools and automated network implementations and tasks using Python scripting.
  • Assisted in the development, implementation, and governance of processes and initiatives to ensure compliance, cost optimization, and efficiency.
  • Environment: System security plan (SP), Federal information system security requirements (FISMA), HIPAA, PCI, ISO 27001.

Education

Bachelor’s - Computer Science

Sathyabhama University
01.2015

Skills

  • Cloud Security
  • Risk analysis
  • Key Management
  • Authentication & Access Control
  • Security Program Management
  • Network Security
  • Cyber Threat Intelligence
  • Security Architecture
  • Cloud Technologies
  • Programming & Scripting
  • Application Security
  • Encryption & Data Security
  • Collaboration & Leadership
  • Vendor Collaboration
  • Documentation

Timeline

Cyber Security Engineer

GE
11.2023 - Current

Information Security Administrator

Gieco
05.2022 - 10.2023

Peoplesoft and IAM Security Administrator

AT&T
01.2020 - 04.2022

System Administrator

Charter Communication
03.2018 - 11.2019

Network Analyst

HSBC
06.2015 - 08.2017

Bachelor’s - Computer Science

Sathyabhama University