Summary
Overview
Work History
Education
Skills
Timeline
Generic

Venkateswararao Velpula

Dallas,TX

Summary

  • Security professional with extensive experience in designing and implementing comprehensive security strategies. Proven track record in identifying vulnerabilities and mitigating risks, ensuring seamless protection of critical assets. Known for collaborative teamwork and adaptability, consistently achieving high-impact results in dynamic environments.
  • Security professional prepared for advanced roles with rich experience in safeguarding systems and networks. Strong track record of implementing security protocols, managing risk, and leading incident response initiatives. Known for collaborative approach, adaptability, and delivering reliable results under evolving conditions. Skilled in threat analysis, vulnerability assessment, and firewall management, with focus on maintaining high standards and ensuring optimal security performance.
  • Diligent with strong background in security engineering. Adept at designing and implementing robust security protocols and has successfully led numerous security audits and incident response initiatives. Demonstrated expertise in threat analysis and risk management, ensuring highest levels of organizational security.
  • Experienced with network security, vulnerability assessment, and incident response. Utilizes holistic approach to analyze and mitigate potential threats, ensuring robust security postures. Knowledge of industry best practices and regulatory compliance, enforcing stringent security standards.
  • Trusted Network Security Engineer with 10 years protecting companies against bad actors who disrupt business operations. Serves as primary safeguard against external threats. Educates colleagues on best practices and network safety protocols. Protects networked assets through both preventive and reactionary measures.
  • Equipped with strong problem-solving abilities, willingness to learn, and excellent communication skills. Poised to contribute to team success and achieve positive results. Ready to tackle new challenges and advance organizational objectives with dedication and enthusiasm.
  • Detail-oriented individual with exceptional communication and project management skills. Proven ability to handle multiple tasks effectively and efficiently in fast-paced environments. Recognized for taking proactive approach to identifying and addressing issues, with focus on optimizing processes and supporting team objectives.

Overview

11
11
years of professional experience

Work History

Senior Security Engineer

Salient Global Technology
08.2024 - Current
  • Working on the IBM Q RADAR and Log Rhythm, (console & web console) providing operations support at the Security Operations Centre for different firms
  • Troubleshooting SIEM dashboard issues when there are no reports getting generated or no data available
  • Managed and resolved high-priority L3 (Level 3) tickets in an ITSM environment, ensuring timely resolution aligned with SLAs
  • Conduct Vulnerability assessments of Network and Security devices using various tools like NMAP and Burp Suit
  • Map out a network, discover ports and services running on the different exposed network and security devices
  • Handling the complete incident management framework cycle right from incident identification, incident containment, performing root cause analysis, suggestion and implementation of preventive and corrective controls and perform network analysis as needed on a case-to-case basis
  • Analyzing Phishing and Spam related mails using header analysis, Body analysis using various tools and block them in O365
  • Preparing Weekly and Monthly reports
  • Will document the tickets with all the action taken for the incident and update it on frequent basis and maintain ticket quality by documenting it with all the required information
  • Conducted and managed Vulnerability scans using Qualys tool
  • Identifying critical weaknesses across diverse IT environments
  • Collaborating with IT teams for patch management and ensures timely deployment of patches and reduce system vulnerabilities
  • Generating detailed security reports and dashboards, summarizing findings for senior management and stakeholders
  • Worked with cross-functional teams to address complex issues, including software bugs, infrastructure failures, and security vulnerabilities
  • Ensured all firewalls, security devices, systems, databases and applications reported data to SIEM and resolved any reporting issues while performing regular health checks
  • Block listing and whitelisting the Domains, Emails in Email security tool Proof point
  • Block listing the malicious IPs in Firewalls
  • Providing USB access request for specific users for business requirement through the requests in the ITSM ticketing tool
  • Purging the host name if any one leaves the organization in the sentinel one
  • Blocking the malicious Hash values in the EDR tool
  • Exposure to Ticketing tool Service Now
  • Mentored junior engineers, fostering a culture of continuous learning and professional growth within the team.
  • Spearheaded cloud migration projects, ensuring secure data transfer and storage across all platforms.
  • Monitored threat intelligence feeds regularly to stay informed about potential risks, proactively addressing vulnerabilities before they could be exploited.
  • Conducted regular audits of IT infrastructure, ensuring compliance with industry standards and regulatory requirements.

Senior Security Specialist

Skill Mine Technologies
05.2022 - 07.2024
  • Worked on the IBM Q RADAR and LogRhythm, (console & web console) providing operations support at the Security Operations Centre for different firms
  • Troubleshooting SIEM dashboard issues when there are no reports getting generated or no data available
  • Managed and resolved high-priority L3 (Level 3) tickets in an ITSM environment, ensuring timely resolution aligned with SLAs
  • Facilitated cross-departmental collaboration on security initiatives, fostering a culture of shared responsibility for organizational safety.
  • Managed a team of junior security specialists, providing guidance and oversight to ensure consistent performance levels.
  • Conduct Vulnerability assessments of Network and Security devices using various tools
  • Map out a network, discover ports and services running on the different exposed network and security devices
  • Handling the complete incident management framework cycle right from incident identification, incident containment, performing root cause analysis, suggestion and implementation of preventive and corrective controls and perform network analysis as needed on a case-to-case basis
  • Conducted and managed Vulnerability scans using Qualys tool
  • Identifying critical weaknesses across diverse IT environments
  • Collaborating with IT teams for patch management and ensures timely deployment of patches and reduce system vulnerabilities
  • Generating detailed security reports and dashboards, summarizing findings for senior management and stakeholders
  • Worked with cross-functional teams to address complex issues, including software bugs, infrastructure failures, and security vulnerabilities
  • Ensured all firewalls, security devices, systems, databases and applications reported data to SIEM and resolved any reporting issues while performing regular health checks
  • Blacklisting and whitelisting the Domains, Emails in Email security tool Proofpoint
  • Blacklisting the malicious IPs in Firewalls
  • Evaluated new technologies and tools for potential integration into existing security infrastructure, maintaining cutting-edge protection capabilities.
  • Blocking the malicious Hash values in the EDR tool
  • Exposure to Ticketing tool Service Now

Associate Manager

3i Infotech
04.2020 - 05.2022
  • Associate in SOC operations for real-time monitoring, analyzing logs from various security/Industrial appliances
  • Administered various incidents/security alerts triggered in the SIEM tool
  • Carrying out log monitoring and incident analysis for various devices such as Firewalls, IDS, IPS, databases, web servers, and so forth
  • Security event analysis and intrusion detection by review and analysis of events generated by various components including IDS/IPS, firewalls, Routers, DB, and various types of security devices
  • Performed Real-Time Monitoring, Investigation, Analysis, Reporting, and Escalations of Security Events from multiple log sources
  • Preparing RCA documents and daily/weekly/monthly Reports
  • Support security incident response processes in the event of a security breach by providing incident reporting
  • Review software posture and work with operations to plan code version upgrade requirements of supported security and network devices
  • Automating routine responses to security events to reducing the human intervention
  • Responsible for managing all aspects of the Vulnerability Risk Management Program including vulnerability identification, analysis, remediation coordination and reporting
  • Coordinate with Admin team to report vulnerabilities by explaining the exploitation and the impact of the issue
  • Managing permissions and access to the product
  • Performing authenticated and unauthenticated vulnerability scanning
  • Assisting teams with vulnerability resolution, including providing assistance researching vulnerabilities solutions and addressing false positives to reduce system workloads, performing confirmation scans when appropriate, meeting regularly with remediation team, and building reports to provide teams with necessary data
  • Understanding the incident based on to determine whether it's false or true positive
  • Collaborated closely with senior management on strategic planning efforts, aligning departmental goals with overarching company objectives.
  • Remedied issues and conflicts among workers using negotiation and active listening.
  • Successfully managed multiple high-priority tasks simultaneously while maintaining strict deadlines ensuring optimal resource allocation.

Senior Software Engineer

Wipro LTD
12.2017 - 04.2020
  • Enhanced network security by implementing advanced threat detection and prevention systems
  • Collaborated with IT teams to integrate security measures into software development life cycles, ensuring secure product releases
  • Fostered relationships with external partners including law enforcement, fellow industry professionals and intelligence communities to stay informed about latest trends, threats and advancements in the field of cybersecurity
  • Strengthened risk management strategies by developing comprehensive risk assessments based on current threats facing the organization's industry sector
  • Conducted regular audits of security infrastructure, identifying weaknesses and recommending improvements
  • Spearheaded the adoption of industry best practices, resulting in a more robust cybersecurity framework for the organization
  • Served as a subject matter expert and resource for both technical and non-technical staff on issues related to cybersecurity best practices, incident response and data protection requirements
  • Prevented costly data breaches by proactively addressing identified vulnerabilities within applications and networks before they could be exploited by malicious actors
  • Managed vendor relationships to ensure adherence to organizational cybersecurity standards and policies
  • Led cross-functional teams in establishing disaster recovery plans, minimizing potential data loss during critical incidents
  • Improved incident response times with the development of comprehensive incident management plans and procedures
  • Reduced cyber attack risks by conducting thorough vulnerability assessments and penetration testing
  • Established a culture of shared responsibility for cyber hygiene within the organization through effective communication of policies, procedures and expectations around securing sensitive information
  • Developed customized cybersecurity training programs to raise employee awareness and minimize human error risks
  • Oversaw digital forensics investigations following security incidents, uncovering root causes and preventing future occurrences
  • Conducted security audits to identify vulnerabilities
  • Developed scalable applications using agile methodologies for timely project delivery.
  • Managed multiple projects simultaneously while maintaining strict deadlines and high-quality standards.
  • Maintained comprehensive documentation of development work, facilitating knowledge sharing among team members.

Senior Security Engineer

Phenom People
02.2016 - 12.2017
  • Reduced cybersecurity risks by regularly conducting vulnerability assessments and penetration tests
  • Developed customized training programs to educate staff on cybersecurity threats and prevention techniques
  • Conducted regular audits of existing security infrastructure, identifying areas for improvement and recommending solutions accordingly
  • Led the migration of critical systems to the cloud while ensuring minimal disruption to business operations and maintaining high levels of security throughout the process
  • Implemented advanced threat intelligence tools, significantly improving incident detection rates and overall system resilience against Cyber attacks
  • Established monitoring systems to proactively identify potential weaknesses in cloud infrastructure, enabling early detection of vulnerabilities or breaches
  • Evaluated third-party vendors for compliance with organizational security standards and industry best practices
  • Implemented continuous integration and delivery pipelines that incorporated automated security testing at each stage, helping catch vulnerabilities before they could be exploited in production environments
  • Collaborated with cross-functional teams to develop comprehensive cloud security strategies and policies
  • Developed risk assessment frameworks tailored specifically for evaluating proposed changes or additions to cloud infrastructure components
  • Optimized resource allocation for cloud-based infrastructure through careful analysis of usage patterns, resulting in cost savings without sacrificing system performance or reliability
  • Enhanced cloud security by implementing robust encryption protocols and access control measures
  • Collaborated with legal and compliance departments to ensure cloud-based solutions adhered to relevant regulations, including GDPR and HIPAA requirements
  • Maintained up-to-date knowledge of emerging threats and trends in cybersecurity, adjusting strategies as needed to ensure optimal protection
  • Managed implementation of multi-factor authentication systems, bolstering access control measures across all platforms
  • Mentored junior engineers, fostering a culture of continuous learning and professional growth within the team.
  • Spearheaded cloud migration projects, ensuring secure data transfer and storage across all platforms.
  • Monitored threat intelligence feeds regularly to stay informed about potential risks, proactively addressing vulnerabilities before they could be exploited.

Linux Administrator

IBM
06.2015 - 01.2016
  • Installation and Configuration SSH, FTP, TELNET AND NFS, DNS, DHCP & IPAM (DDI)
  • Expertise on different file systems like ext3, ext4, XFS and NFS
  • Expertise in server troubleshooting and hardening
  • Coordinating with customers for change management
  • Installing & removing packages using RPM & YUM; contributing to kernel patching by using satellite server
  • System Administration, maintenance and monitoring various day-to-day operations
  • Adding route entries for accessing servers from different zones & executing system administration, maintaining & monitoring various day-to-day operations
  • Performing patch upgradation and OS upgradation as per vendor or customer requirements & automating job for various tasks using CRON & AT
  • Securing the servers as per organization's policies & providing L1, L2 & L3 level support to the customer on all Linux server issues as per SLA
  • Installing software, patching, upgrading, & maintaining operating system & implementing RHEL Pacemaker cluster setup
  • Expertise in LINUX / UNIX system builds, administration, Installations, Upgrades, Troubleshooting on different distributions such as Ubuntu, CentOS, RHEL
  • Resolving the hardware issues (DIMM, Hard disk) on data center for physical servers
  • Expertise in user & group management, disk partitioning (LVM) and working experience in large-scale enterprise development environment
  • Utilize tools like top, htop, iostat, and vmstat to monitor CPU, memory, disk I/O, and network usage
  • Developed custom shell scripts for system monitoring and automation, improving response times to incidents
  • Provided 24/7 support for critical production systems, reducing average incident resolution
  • Spearheaded a migration project to RHEL 8, resulting in enhanced system security and performance
  • Recognized for leading a team in a successful data center consolidation, reducing operational costs
  • Analyze output to identify bottlenecks, such as high CPU load or excessive swapping
  • Adjust kernel parameters using sysctl to optimize performance
  • Use tune2fs to adjust filesystem parameters, such as enabling journaling or optimizing block sizes based on application needs
  • Implement RAID configurations (e.g., RAID 0, RAID 1, or RAID 10) to improve disk performance and redundancy
  • Use ulimit to manage resource limits for users and processes
  • Tune caching parameters for applications (e.g., database caching) to reduce disk I/O
  • Analyze CPU, memory, and storage trends to forecast future needs
  • Identify thresholds for CPU, memory, and disk I/O before performance degradation occurs
  • Maintain documentation of capacity planning processes and decisions for future reference
  • Regularly report on system performance and capacity forecasts to stakeholders for informed decision-making
  • Developed and conducted training programs for junior staff on RHEL best practices and troubleshooting techniques
  • Configure Private DNS Zone to resolve private FQDN of PaaS services with endpoint IP
  • Create VNET and Subnet as per application tier (tier 2 and tier 3) such as Web Zone, APP Zone and DB Zone
  • Managing SN Tickets based related to deployment, troubleshoot the issue, enabling the backup, costing for services (IaaS and PaaS)
  • Configure and enable backup as per backup policy and retention period (daily, weekly, monthly and yearly) for VMs
  • Sharing cost estimates of IAAS and some PAAS component
  • Check connectivity traffic IN and OUT from subnet using NSG and UDR
  • Check connectivity issue along with respective stake holder (Security FW team and On-prem FW team)
  • Creating and managing Infra of cloud as per application architecture
  • Deployment of an Azure VM (Windows server and Linux server) using custom or golden hardens images or marketplaces
  • Monitoring Azure VM alerts using Metrics & Action Groups
  • Troubleshooting Azure VM issues with the help of Boot Diagnostics, Serial Console, Redeploy, Guest diagnostics
  • Create an Azure Virtual network in Azure portal and Configure Virtual networks connectivity using VET peering
  • Create and manage VM scale set and enable auto-scaling, spinning image reference using image definition of image server
  • Configuration of Traffic manager, Load balancer and Application Gateway Load Balancer
  • Building & releasing Ec2 instances Amazon Linux & Oracle Linux, Redhat and Windows for POC, Development and Production environment; setting up & attaching & detaching storage volumes to OCM instances & EBS volumes to Ec2 instances
  • Troubleshooting all network related issues, file system problems and server troubleshooting & hardening
  • Launching & configuring OCM Cloud Servers & Amazon EC2 (AWS) Cloud Servers using AMI's (Linux/Ubuntu)
  • Configuring the servers for specified applications
  • Configuring & managing cloud watch alerts, S3 storage, security groups, NFS, FTP, TELNET, SSH & VPC
  • Managed backup and disaster recovery through strict data control and retention policies, personally handling recovery tasks when issues arose.
  • Established comprehensive disaster recovery plans that safeguarded valuable company data and ensured rapid system restoration in the event of a catastrophic failure.
  • Implemented effective monitoring solutions, allowing for rapid identification and resolution of potential issues before they impacted endusers.

Senior Associate

HCL Info Systems
04.2014 - 05.2015
  • Created and serviced administrator and user accounts on Linux-based systems, managing deployments
  • Managed backup and disaster recovery through strict data control and retention policies, personally handling recovery tasks when issues arose.
  • Tuned system performance to optimize efficacy of new and existing hardware components.
  • Installed system-wide hardware components, confirming inter-operation and compatibility with Linux-based software destroys.
  • Coordinated cross-site installation of networked systems, confirming post-install connectivity.
  • Maintained smooth operation of multi-user computer systems through collaboration with hardware and network engineers.
  • Interacted directly with users to diagnose and correct major system issues and address concerns.
  • Managed virtualization platforms, optimizing resource allocation to maximize system performance across diverse workloads.
  • Optimized network connectivity by configuring firewalls, switches, routers, and other networking devices within the Linux environment.
  • Supported end-users effectively managing issues related to Linux-based systems and applications in a timely manner
  • Maintained high availability of Linux servers through vigilant monitoring, preventive maintenance, and rapid issue resolution.
  • Enhanced system performance by optimizing configurations and implementing best practices for Linux administration.
  • Implemented and maintained virtual private networks
  • Analyzed network traffic and performance metrics to optimize system performance.
  • Researched and recommended new technologies and strategies for improving system performance
  • Completed reports detailing network and systems performance and downtime issues.
  • Installed important security and functionality patches to maintain optimal protections against intrusion and system reliability.
  • Streamlined operational efficiency by identifying areas for improvement and proposing actionable solutions.
  • Effectively managed multiple competing priorities while maintaining focus on delivering exceptional results for clients and the organization.

Education

Master of Science - Computer Science

Osmania University
India
06.2011

Bachelor of Science - Computer Science

Kakatiya University
Hyderabad, India
06-2008

Skills

  • FortiGATE
  • IDS/IPS
  • Qualys
  • Nessus
  • SentinelOne
  • Crowd Strike
  • LogRhythm
  • IBM QRadar
  • Palo Alto
  • Splunk Phantom
  • Proofpoint
  • Forcepoint
  • AWS, Azure, GCP, OCI
  • ISO27001
  • HIPAA
  • Penetration testin
  • Identity and Access management
  • Two-factor authentication implementation
  • Penetration testing skills
  • Operating system hardening
  • Threat intelligence analysis
  • Incident response management
  • Cloud security management
  • Vulnerability assessment expertise
  • Vulnerability assessment
  • Incident response
  • Patch management
  • SIEM provider management
  • Threat analysis
  • Cloud security
  • Risk assessment
  • Incident reporting
  • Incident management

Timeline

Senior Security Engineer

Salient Global Technology
08.2024 - Current

Senior Security Specialist

Skill Mine Technologies
05.2022 - 07.2024

Associate Manager

3i Infotech
04.2020 - 05.2022

Senior Software Engineer

Wipro LTD
12.2017 - 04.2020

Senior Security Engineer

Phenom People
02.2016 - 12.2017

Linux Administrator

IBM
06.2015 - 01.2016

Senior Associate

HCL Info Systems
04.2014 - 05.2015

Master of Science - Computer Science

Osmania University

Bachelor of Science - Computer Science

Kakatiya University
Venkateswararao Velpula