CV - Venkata Subhash Muthareddy
CV - Venkata Subhash Muthareddy
- He is proficient with multiple security vendor tools like Qualys Guard (VMDR, WAF, Policy Compliance,
Certificate Management etc.), RiskSense, ArcSight, RSA envision, STRM, Qradar, Sumologic, Symantec
Data Loss Prevention, Blue coat DLP, Tanium End Point Protection, SSL VPN Secure Access, Sourcefire
IDP/IPS, Symantec End Point Protection, Tripwire, FireEye etc.
Contact Details
Mobile No : +91 7675962108
Email : [email protected]
Selected Experience:
Responsible and accountable for delivering Vulnerability Management and External Attack Surface
Management (EASM) services to global clients. We help clients with Continuous Threat and Exposure
Management analysis, performing continuous authenticated scans, Industry specific Threat Intelligence and
do RISK based vulnerability prioritization for remediation efforts to reduce overall risk foot print on their
environment.
Organization: Deloitte & Touché Assurance Enterprise Risk Services India Pvt Ltd.
Selected Experience:
Working as an Advisory Manager in Deloitte Cyber Risk Services. During his stint at Deloitte, Subhash
worked at both Deloitte USI and US practices. Subhash is a key member of Deloitte Attack Surface
Management team, and he helps large scale clients in driving risk reduction efforts across the enterprise.
He is known for adopting new technologies to better operate and automate client’s attack surface
management programs. He is responsible for leading teams that perform Risk assessments, gap
assessments, current state maturity assessments, vulnerability assessments, architecture reviews,
configuration reviews for a wide array of clients (includes many Fortune 100 clients).
At Deloitte, I am known for my ability to drive and execute complex client engagements.
Proposals and Pricing: Work on new client proposals, pipeline, expanding existing clients into new
services and provide strategic pricing estimates. Consistently sold more than $2-5 million revenue
engagements over the last 4-5 years. Was instrumental in winning Cybersecurity Operational Support
Services contract (~$22M+ in yearly revenue) for a major financial client.
Cyber Security Consulting: Worked on multiple large to very large security engagements including
defense in depth assessments, strategy engagements and managed services.
- Developed VM from scratch to a mature automated state for a fortune 500 client. Proposed Risk-Based
approach for vulnerability remediation to improve the risk posture for the client in a short stint.
Implemented script-based ticket creation approach to automate BAU ticket creation process for open
vulnerabilities identified on client network.
- Provide Subject Matter Expert (SME) level support for Vulnerability Management area to set up new
clients to be onboarded into Deloitte MSS (Managed Security Services). Work with client(s) key
stakeholders to achieve operational excellence by identifying areas of improvement in steady state
operations.
- Managing upwards and talent (Hiring, creating shared pool of resources in TVM and ASM areas,
Coaching, Mentoring)
Selected Experience:
Establish a Security Operations Center for catering the overall security operations at Juniper Networks
SIEM Activities (Internal Security operations for SOC using STRM and ECCC Project Operations for
Vendor using ArcSight):
Build and fine-tuning Dashboards, Data Monitor Active Lists, Active Channels, Custom correlation rules,
reporting templates, monitoring views and asset mapping configurations as part of SIEM customization
with Security Threat Response Manager
Detecting and prevent Zero-day attacks on critical assets using SIEM
Identify the technology gaps and provide recommendations to JTAC Team members with the
requirement.
Co-coordinating with Arcsight professional support for building use cases according to Vendors
Requirements.
Recommended USE cases for Threat, Database, Identity and access management etc.
Spam Incident handling to ensure there is no threat posed to Juniper Network
Carrying the Cert request process for Email and Web SSL Certificates
Driving operations from malware behavior aspect with Fire Eye tool
Operations handling of Symantec End Point Manger
Incident Response:
Specialties:
+Investigations
+Forensics
+ Incident Response
Penetration Testing:
Performing first level penetration testing for external facing juniper websites and websites in staging
environment that are to be moved to production down the line.
Selected Experience:
Establish a Security Operations Center for monitoring for 7000+ business critical assets & PCI material
servers. The purpose of this project is to implement various Use Cases & monitor business-critical Assets
using an interim SIEM solution and led the initiative for PCI & SOX compliance.
Selected Experience:
Establish event monitoring for 8000+ business critical assets & PCI material servers. Customer has the
mandate to comply with Payment Card Industry (PCI) and hence the top priority is to achieve readiness for
the compliance. The purpose of this project is to implement & monitor business-critical Assets using an
interim SIM solution to meet Customer’s readiness for Payment Card Industry (PCI) compliance.
The project involves Incident analysis, incident responses, incident remediation, fine tuning and
developing co-relation rules. Advance device integration, IDS, IPS & VA tools
Responsible for specialized investigation, threat Analysis and remediation in response to notifications
using SIEM tools such as ArcSight
Monitor ArcSight dashboards to keep track of security events, health of SIEM devices
Troubleshooting and deep analysis of Security alerts
Define rules, customized reports, and schedule reports as per requirements. Fine tune SIEM Solution to
reduce false alerts, improve the performance etc.
Troubleshooting the issues related to SIEM solution and ensuring health of SIEM Solution Devices
Integration of new log sources with SIEM Solution
Analyzing both corporate and retail logs downloaded from the loggers for the entire shift (8 hours).
Recognizes successful intrusions and compromises through review and analysis of relevant event detail
information
Understanding current vulnerabilities, attacks and countermeasures
Managing KM activities in the Team (Introduced Shift handover report and MOM in the project for better
communication between each shift and Onsite.)
Identification, investigation and escalation of security breaches to the client-side Security team (called as
Central Security Incident Response Team)
Creating Rules, filters and active lists in ArcSight to filter out events obtained from the Logger
Creation of New Dashboard as per the requirement
Creating new process documents which would help the Analyst in analyzing events
Launch and track investigations to resolution. Recognizes attacks based on their signatures Differentiates
false positives from true intrusion attempts
PCI compliance enforcement on the production assets using FIM tools, such as Trip Wire, Deep Security
Third Brigade and Symantec Critical System Protection
Firewall compliance auditing using Skybox
Log Analysis
Timely escalation of incidents to security management team
Handling threat management tasks by subscribing various security alerts from various sources
Discussion and brainstorming of relevant security alerts with security consultants and coming out with
threat management plan
Review and refinement of threat management plan
Vulnerability Reporting and vulnerability scan scheduling using Qualys Guard in line with PCI
requirements.
Schedule and analyze vulnerability scans on various business critical assets
Follow-ups with asset owners for remediation of vulnerabilities either at OS or application level
Tracking, validation and closure of critical and high vulnerabilities
Acting as a shift lead (L2) and handling the entire team of about 30 members per shift
Certifications
Certified Information Systems Security Professional (CISSP)
Cisco Certified Network Associate (CCNA) Certified (CISCO ID No. CSCO11688665)
Juniper JNCIS-ER (Specialist, Enterprise Routing) Certified
Juniper JNCIA-EX (Associate, Enterprise Switching) Certified
Juniper JNCIA-JUNOS (Associate, JUNOS) Certified
Attended a 40-hour workshop on “Packet Analysis & Web Application Security” from K-secure IT
security Services.
Certified Ethical Hacker v7 (CEH) Certified (EC-Council Membership ID. ECC955088)
EC-council Certified Security Analyst (ECSA) Certified
Qualys Guard certified Specialist (Vulnerability Management)
ArcSight Certified Professional (ACP)
Education