Securing Digital Assets

Information Security & IT Risk Professional

5+

Years Experience

10+

Projects Completed

3k+

Assessments Done

40+

Certifications

About Me

Delivering excellence in cybersecurity and risk management with a strategic approach to protecting digital assets.

Certified

ISO 27001:2022 Lead Auditor

With over 5 years of experience in cybersecurity and risk management, I serve as a Cyber Strategy and Governance Consultant at KPMG Global Services, leading projects in security governance, compliance, and third-party risk assessments. I specialize in IT/IS risk assessments, vendor security evaluations, and aligning client operations with standards like ISO 27001 and NIST. My background includes hands-on work in vulnerability assessments, incident response, and operational security using tools such as Bitsight, Tenable.sc, and Darktrace. Certified as an ISO/IEC 27001:2022 Lead Auditor, Information Security Officer, and Red Team Expert, I’m passionate about converting evolving security threats into strategic opportunities.

IT Audit & Risk Leadership

Transforming control environments

Successfully managed multiple IT audit and risk assessment projects, resulting in a 30% improvement in IT control environments and enhanced security governance across the organization.

Security Operations Excellence

Advanced threat detection & response

Led a team in implementing a new SIEM system, reducing incident response time by 40% and improving threat detection capabilities by 50%.

Third-Party Risk Management

Securing the vendor ecosystem

Spearheaded development of a comprehensive Third-Party Risk Management program, reducing vendor-related security incidents by 60% within the first year.

Security Awareness Champion

Building human firewalls

Designed and executed a company-wide security awareness program, increasing awareness scores by 75% and reducing successful phishing attempts by 80%.

Compliance Mastery

Perfect certification execution

Orchestrated successful ISO 27001 certification across all 14 domains, achieving certification with zero non-conformities.

Strategic Vulnerability Management

Intelligent risk prioritization

Implemented a risk-based vulnerability management approach, reducing average time to patch high-risk vulnerabilities by 65%.

Areas of Expertise

Specialized cybersecurity services to protect your organization across multiple domains and compliance frameworks.

Cybersecurity Consulting

Strategic security advice and implementation guidance for organizations of all sizes.

Click to learn more

ISO 27001 & 27701 Lead Auditing

Expert guidance through the ISO certification process, from readiness to certification.

Click to learn more

Third-Party Risk Management

Comprehensive assessment and management of risks posed by third-party vendors and service providers.

Click to learn more

Security Policy Development

Creation of tailored security policies and procedures aligned with industry standards.

Click to learn more

Security Awareness Training

Engaging training programs to build a strong security culture within organizations.

Click to learn more

Security Governance

Establishing effective security governance structures and processes.

Click to learn more

Cloud Security

Specialized security guidance for cloud environments and migrations.

Click to learn more

Security Maturity Assessment

Evaluation of organizational security maturity with roadmaps for improvement.

Click to learn more

My Security Journey

Evolution from tactical security operations to strategic leadership

Red Team Operations

2019 - 2020

Specialized in ethical hacking and adversarial simulation to expose critical security gaps before attackers could exploit them.

  • Delivered strategic remediation guidance that eliminated 90% of critical vulnerabilities
  • Developed custom C2 frameworks that became standard testing tools
  • Authored comprehensive threat reports used for security training
  • Reduced attack surface by 60% through targeted penetration testing

Blue Team Defense

2020 - 2022

Built robust cyber defense systems that detected and neutralized threats in real-time.

  • Reduced incident response time by 40% through SOC optimization
  • Established enterprise security monitoring covering 100% of critical assets
  • Automated Tier 1 incident handling, saving 200+ analyst hours monthly
  • Conducted proactive threat hunts that identified 15+ advanced persistent threats

Security Leadership

2022 - Present

Bridged offensive and defensive strategies to create adaptive security programs.

  • Led purple team exercises that improved detection rates by 75%
  • Implemented NIST CSF framework across 3 business units
  • Conducted 50+ architecture reviews preventing security debt accumulation
  • Mentored 12 security professionals into senior roles

Education & Qualifications

A journey of continuous learning and professional development in technology and security.

Texas McCombs School of Business

Post Graduate Program, Artificial Intelligence and Machine Learning

Jan 2023 - Jan 2024

Skills:

Hypothesis TestingData VisualizationSQLPythonMatplotlib

Welingkar Institute of Management

Postgraduate Degree, Information Technology Project Management

Jan 2021 - Dec 2022

Indian Institute of Technology, Kanpur

Advanced Program in Cyber Security and Cyber Defence

2020 - 2020
Grade: Outstanding

Cyber-Security on Critical Infrastructure, Operational Technology Systems, Information Technology Systems, Threat landscape, and Intelligence.

Activities:

Capstone ProjectVA/PTCTF

Skills:

Information SecurityRisk AssessmentSEIMRisk CompliancePenetration TestingCyber Risk Management

School of Research and Technology, People's University

Bachelor's in Technology, Mechanical Engineering

Aug 2017 - Nov 2020
Grade: 7.49

Savitribai Phule Pune University

Bachelor of Engineering - BE, Mechanical Engineering

Jun 2015 - Jun 2016

Professional Experience

Cyber Security Consultant

Mar 2024 - Present · 1 yr 3 mos

KPMGBengaluru, Karnataka, India · Hybrid

Spearheading complex Information Security Governance and Compliance engagements at KPMG.

Key Responsibilities:

  • Spearhead the execution of complex Information Security Governance and Compliance engagements, ensuring alignment with industry best practices
  • Conduct comprehensive IT and IS Risk Assessments, meticulously analyzing potential threats and vulnerabilities across client organizations
  • Orchestrate thorough vendor and third-party security assessments, rigorously evaluating compliance with ISO 27001 and NIST 800-53 standards
  • Craft detailed, high-quality reports based on in-depth assessments and remote evaluations, providing actionable insights to clients
  • Perform meticulous second-level quality reviews of peer-generated reports, maintaining the highest standards of deliverable quality
  • Collaborate with cross-functional teams to develop and implement robust security governance frameworks, enhancing overall organizational resilience
Information Security
Cyber-security
ISO 27001
Third Party Risk Management (TPRM)
NIST 800-53
Risk Assurance
Information Security Governance
Cyber Risk Management
ISMS
Risk Compliance
NIST
IT Security Assessments
Cyber Security Risk
Enterprise Risk
Security Consulting
Risk Assessment

Information Security - Senior Associate

Dec 2022 - Mar 2024 · 1 yr 4 mos

MoraeBengaluru, Karnataka, India · Hybrid

Led security assessments and vulnerability analyses at Morae.

Key Responsibilities:

  • Spearheaded operational vulnerability analyses and security assessments, ensuring strict adherence to ISO 27001 standards
  • Orchestrated comprehensive third-party security assessments, meticulously evaluating vendor compliance with regulatory and industry standards
  • Engineered and implemented cutting-edge security governance frameworks and risk management strategies, significantly enhancing compliance and control environments
  • Vigilantly monitored security logs and data sources, conducting thorough investigations and forensics analyses to swiftly detect and assess security incidents
  • Coordinated complex incident response activities, effectively managing stakeholder communications and meticulously documenting response procedures
  • Leveraged advanced security technologies to proactively monitor threats and mitigate security risks
SIEM
Threat Management
Vulnerability Management
Information Security
Risk Management
Threat & Vulnerability Management
Cyber-security
GRC
Compliance Management
Vulnerability Assessment
Problem Solving
Incident Handling
Incident Management
NIST 800-53
Internal Audits
Information Security Governance
Security Information and Event Management (SIEM)
Cyber Risk Management
Request for Proposal (RFP)
ISMS
Security Operations
Risk Compliance
NIST
Cyber Threat Intelligence (CTI)
Cyber Security Risk
Enterprise Risk
Incident Response
Security Consulting
Risk Assessment

Information Security Engineer

Sep 2021 - Dec 2022 · 1 yr 4 mos

BrillioBengaluru, Karnataka, India · Hybrid

Architected IT audit programs and security measures at Brillio.

Key Responsibilities:

  • Architected comprehensive IT audit work programs, conducting internal audits to identify and address potential security vulnerabilities
  • Engineered sophisticated dashboards for tracking audit progress and vulnerability management, enhancing visibility and decision-making capabilities
  • Executed in-depth security reviews on third-party software, bolstering Vendor Technology Risk initiatives and assessments
  • Formulated detailed Standard Operating Procedures (SOPs) for new processes, including RACI Matrix and Admin access reconciliation, with focus on Third-Party Risk Management
  • Collaborated closely with the internal compliance team to maintain rigorous ISO 27001 standards across all 14 domains
  • Spearheaded the development and implementation of innovative security measures, significantly improving the organization's overall security posture
SIEM
Threat Management
Vulnerability Management
SOC 2
Information Security
Risk Management
Threat & Vulnerability Management
Cyber-security
Application Security Assessments
GRC
Vulnerability Assessment
Third Party Risk Management (TPRM)
Problem Solving
Incident Handling
Incident Management
Project Management
Internal Audits
Information Security Governance
Cyber Risk Management
Request for Proposal (RFP)
ISMS
Risk Compliance
NIST
Cyber Threat Intelligence (CTI)
Cyber Security Risk
Enterprise Risk
Incident Response
Security Consulting
Risk Assessment

Winter Trainee

Jan 2021 - Feb 2021 · 2 mos

Oil and Natural Gas Corporation LtdMumbai, Maharashtra, India

Learned about ONGC's operations including exploration, production, and alternate energy.

Key Responsibilities:

  • Studied conventional exploration and production processes
  • Learned about refining operations
  • Researched progressive development of alternate energy sources like coal-bed methane and shale gas
Energy
Oil & Gas
Operations

Engineering Intern

Apr 2019 - Sep 2019 · 6 mos

Centre of Excellence in Maritime and Shipbuilding (CEMS)Mumbai, Maharashtra, India

Engineering internship at maritime research center.

Key Responsibilities:

  • Gained practical knowledge in maritime engineering
  • Participated in shipbuilding research projects
  • Applied engineering principles to maritime challenges
Maritime Engineering
Shipbuilding
Research

Technical Support Specialist

Jul 2018 - Mar 2019 · 9 mos

GAOTek Inc.Mumbai Area, India

Worked as Management Trainee (Support Specialist) with GAO Tek Inc.

Key Responsibilities:

  • Product sourcing including market research and supplier research
  • Prepared technical documents including product web pages, data sheets, and Q&A's
  • Supported technical documentation and product information management
Technical Support
Market Research
Technical Documentation

Intern (Tech Support)

Mar 2018 - Jun 2018 · 4 mos

GAOTek Inc.Mumbai Area, India

Technical support internship at GAOTek Inc.

Key Responsibilities:

  • Product sourcing and market research
  • Prepared technical documents including product web pages and data sheets
  • Assisted with technical support operations
Technical Support
Research
Documentation

Comprehensive Automobile Development Internship

Dec 2017 - Dec 2017 · 1 mo

Ezenith EducationHyderabad, Telangana, India

Training on vehicle dynamics and automobile design.

Key Responsibilities:

  • Trained on various vehicle dynamics, architecture, design aspects, parameters and simulation
  • Applied training to create technical presentation for automobile called 'Vadar 350'
  • Studied braking systems and vehicle performance
Vehicle Dynamics
Automobile Design
Engineering

Certifications

Latest Certifications

  • ISO 27001:2022 Lead Auditor/Implementer2023
  • ISO 27701:2019 Lead Auditor2023
  • ISO 42001:2023 Lead Auditor/Implementer2023
  • EXIN Certified Information Security Officer2023
  • Red Team Expert2023

Projects

Implementation of Honeypot, NIDs, and HIDs technologies in SOC EnvironmentCapstone Project

Feb 2020 - Jul 2020

Associated with Indian Institute of Technology, Kanpur

Our project goal was to get a peek at the defensive side of cybersecurity using open-source tools which would include monitoring and investigation. In doing so we had studied the profile of attacks and increased our understanding of various threat vectors.

Honeypot
NIDS
HIDS
SOC
Open Source

Security Leadership

2022 - Present

Direct comprehensive security programs, aligning offensive and defensive strategies to enhance organizational resilience.

Key Achievements:

  • Orchestrated purple team exercises
  • Implemented & optimized multiple security frameworks
  • Led architecture security reviews
  • Mentored security teams
Security Leadership
Purple Teaming
Security Frameworks

Skills & Expertise

Information Security
Cyber-security
ISO 27001
Third Party Risk Management (TPRM)
NIST 800-53
Risk Assurance
Information Security Governance
Cyber Risk Management
ISMS
Risk Compliance
NIST
IT Security Assessments
Cyber Security Risk
Enterprise Risk
Security Consulting
Risk Assessment
SIEM
Threat Management
Vulnerability Management
SOC 2
GRC
Compliance Management
Vulnerability Assessment
Problem Solving
Incident Handling
Incident Management
Project Management
Internal Audits
Security Information and Event Management (SIEM)
Request for Proposal (RFP)
Security Operations
Cyber Threat Intelligence (CTI)
Incident Response
Application Security Assessments
Vehicle Dynamics

Publications

Implementation of Honeypot, NIDs, and HIDs Technologies in SOC Environment

River PublisherAug 15, 2021

This study explores the implementation of honeypot technologies, network-based (NIDS) and host-based (HIDS) intrusion detection systems within a scalable, open-source Security Operations Centre (SOC) environment.

Authors:

Mentors:

  • Sandeep Shukla

    Professor and Rajiv and Ritu Batra Endowed Chair for Cyber Security, Computer Science and Engineering at Indian Institute of Technology, Kanpur

  • Anand Handa

    SVP-DFIR || Postdoctoral Research Fellow, C3i Hub, Indian Institute of Technology, Kanpur || Instructor || Mentor || Researcher

Co-Authors:

  • Sudipta Chatterjee

    Senior Software Engineer at Randstad Digital

  • Ronald Dalbhanjan

    Seasoned Technology Professional

  • Tanuj Pathak

    Senior Manager Applications Security at Marsh McLennan | CEH | CASE

  • Shivam Suraj Sahay

    Associate Director @ HCLTech | Next Gen Transformation lead, ML & AI

View publication

Professional Endorsements

Trusted by industry leaders

"During the brief period I was managing the CISO function at Brillio, Rajdeep joined Brillio. I found him quite energetic with unique thoughts of making a difference. He had a commitment towards security and I always believed he would make big for his sustained focus on the topic. All the very best Rajdeep."

Mosesraj R

Senior Vice President - Global Head of IT

November 2024

Get in Touch

Have a project in mind or need consultation on your security posture? I'm here to help secure your digital assets.

Send a Message

Fill out the form below and I'll get back to you as soon as possible.

Contact Information

Reach out through any of these channels

Availability

Current schedule and response times

Consulting Hours

Monday - Friday: 9:00 AM - 5:00 PM EST

Response Time

Typically within 24-48 business hours

Project Availability

Currently accepting new clients for Q3 2025