Expert identifying and protecting sensitive data at scale. Manage complex, expensive, and time-consuming cloud workloads hardening process. Identify and alert sensitive data, such as personally identifiable information (PII).
Experience with highly available and fault-tolerant cloud enterprise protection against new and emerging cloud threats. Establish and enforce security to identify new cloud threats dynamically using next-generation technologies work with large data sets.
Provide technical guidance and coaching suspicious and malicious cloud activities in the cloud using native functionalities to identify suspicious behaviors from cloud resources and mitigating potential risks.
Collaborate with other professionals to determine functional and non-functional data privacy requirements for cloud considering IS0 27018. Ability to persuade and influence tech leaders to adopt data-privacy best approaches.
Robust knowledge in IAM cloud identity management. Experience in SoD, configuring cloud permissions in place to ensure that the right people have access to the right resources, considering identity-based policies in IAM, including users, groups, or roles
Reduce potential harm by effectively responding to security incidents. Quick, effective, and consistent responses to security incidents to reduce potential harm. Develop runbooks to create a library of incident response mechanisms.
Cybersecurity Specialist & Cloud Computing Expert with +10 years experience in IT infrastructure.
Specialist delivering assets for development teams in Google Cloud Platform (GCP) and Amazon web services (AWS)
Hands-on cloud security enterprise architect, with experience in SIEM/SOC, IAM, cryptography, pentest, network topologies, operating systems, databases, and applications.
Experience in DevSecOps analysis to discover vulnerabilities in software, identifying CI/CD risks gaps and recommending secure-coding process (S-SDLC).