
Gökay Pekşen
Verified Expert in Engineering
IT Security Developer
Gökay is a senior manager and principal advisor specializing in cyber security, information security, audit, and standards and regulations. He is highly skilled in enterprise security architecture and an expert in delivering sustainable protection and enhancing reputation and digital existence while enabling risk mitigation to prevent financial loss. Gökay has been working with different technologies, programming languages, and frameworks and is willing to embrace new and challenging projects.
Portfolio
Experience
Availability
Preferred Environment
Zoom, MacOS, Linux, Windows
The most amazing...
...thing I've designed is Turkey's first DevSecOps continuous integration and continuous delivery pipeline.
Work Experience
Founder and CEO
Prime Threat
- Provided reorganization services to align the cyber security organization, infrastructure, and operations with the secure vision, while also establishing a strong market perception focused on cyber threat and risk management.
- Designed and implemented a security framework for a major global logistics customer in Turkey in accordance with local and international standards and regulations to foster a risk and security culture and risk management.
- Initiated an investment consulting project in cyber security startups for a local company to assist them in strengthening their financial structure through increased market share and volume and global expansion.
Cybersecurity Consultant
Olea Global Pte. Ltd. - Main
- Conducted a comprehensive ISO 27001 internal audit. This resulted in a thorough evaluation of our information security management system (ISMS), identifying areas for improvement and enhanced ISO 27001 compliance.
- Helped implement effective security controls, mitigate risks, and integrate our practices with industry best practices and regulatory standards.
- Increased ability to detect, respond to, and recover from potential cyber threats, thereby minimizing business interruptions and protecting sensitive data.
Security Lead (Policies & Procedures)
Toyota Material Handling, Inc - Main
- Designed a cybersecurity management skeleton to inform management of the company's cybersecurity needs and developed operational methodologies.
- Developed cybersecurity policies and practices by worldwide standards and frameworks such as ISO, IoTSF, etc., to meet the company's needs.
- Performed risk analysis and threat modeling to comprehend future and potential threats that will unavoidably produce risks that can result in lost revenue.
Security Compliance Consultant
Bonify, LLC
- Established a cyber security management policy with an overarching strategy for running security operations in accordance with international and commercial standards, such as ISO 27001, GDPR, and Wix and Shopify platform compliance for a web app development company.
- Reviewed the current IT and security architecture and suggested architectural improvements for servers, security tools/devices, and software to strengthen infrastructure.
- Developed a roadmap to enhance the entire security posture of future DevOps-manufactured products and services and proposed revisions based on requirements and needs.
Cybersecurity Advisor to CIO
Istanbul Metropolitan Municipality
- Participated in cross-functional teams projects involving IoT, SCADA, and smart city concepts to strategize the management and implementation of administering Istanbul.
- Enhanced enterprise security by creating a new generation of fortified security infrastructure. Built a framework for security management and enterprise architecture.
- Planned projects to improve know-how and infrastructure for a reliable and secure operation. Set the metrics, KPIs, and operational IT processes for the security organization to enhance security operations and software and infrastructure security.
Information Security VP and Enterprise Architect
Bankalararası Kart Merkezi (Interbank Card Center)
- Designed and constructed a world-class cyber security infrastructure to safeguard 250 billion TL in annual local payment transactions.
- Created a vision of success to compete with other banking and payment organizations and establish Turkey's first payment system and scheme (TROY).
- Implemented the strategy in stages, including assessment phases, design, construction, operation, testing, auditing, and continuous improvement.
- Reported to the senior vice president of security, compliance, and service management. Managed a team of four direct and twenty indirect employees overseeing a 1.5 million dollar annual CAPEX and OPEX budget.
- Implemented a framework for continuous penetration testing and code reviews to develop a proactive security management system to ward off cyber threats.
- Managed and led the procurement and budgeting processes to acquire products and services and consultation for operations.
- Constructed TROY's payment and information technology infrastructure following global payment schemes like Discover Card and international regulations such as PCI DSS.
Senior Cybersecurity Consultant
PwC
- Designed and built a cyber security team to conduct security assessments, penetration and vulnerability testing, and incident response processes.
- Strengthened and fortified customers' information technology infrastructure and applications to prevent known and unknown cyber threats in significant industries.
- Oversaw auditing customers' cyber security and information security processes to inform them about their compliance with global law, regulations, and best practices.
Experience
TROY Payment Project
https://troyodeme.com/en/Cyber Security Organization and Business Model Designing
Turkey's Very First DevSecOps CI/CD Pipeline
Skills
Tools
Acunetix, Netsparker, Nessus, Accunetix Vulnerability Scanner, Zoom
Paradigms
Penetration Testing, Security Software Development, DevOps, DevSecOps, Microservices, Microservices Architecture, Continuous Deployment, Continuous Delivery (CD), Continuous Development (CD), Continuous Integration (CI)
Platforms
Windows, MacOS, Linux, Imperva Incapsula, Google Cloud Platform (GCP), Azure, Amazon Web Services (AWS), Embedded Linux
Industry Expertise
Cybersecurity, Network Security, Security, IT Security
Storage
Database Security, Azure Active Directory
Other
Networks, Information Security, Auditing, ISO 27001, Training, ICT Training, Information & Communications Technology (ICT), Ethical Hacking, Certified Ethical Hacker (CEH), IT Infrastructure, Identity & Access Management (IAM), Firewalls, Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), Scanning, System-on-a-Chip (SoC), Web Intelligence, Threat Intelligence, Threat Modeling, CISO, Data-level Security, Data Privacy, International Data Privacy Regulations, Vulnerability Management, Vulnerability Assessment, Red Teaming, PCI DSS, ISO 27002, Endpoint Security, Vulnerability Identification, CyberArk, Web Application Firewall (WAF), Data Loss Prevention (DLP), Compliance, Architecture, Information Security Management Systems (ISMS), NIST, Security Engineering, Security Architecture, GRC, Security Audits, Web Security, Computer Security, Risk Management, Security Management, Project Consultancy, ISO 22301, ITIL 4, IT Service Management (ITSM), GDPR, Enterprise Architecture, Business Continuity, SIEM, Mobile Payments, Digital Payments, Zero-day Vulnerabilities, IBM Security Guardium, Cloud Security, CI/CD Pipelines, System Administration, CCNA, CCNA Security, Business Continuity & Disaster Recovery (BCDR), Migration, Data Protection, Single Sign-on (SSO), Programming, Encryption, Data, Payment APIs, Card Payments, Disaster Recovery Plans (DRP), Software Development Lifecycle (SDLC), RESTful Microservices, IoT Security, SCADA, Governance, IT Governance, Data Governance, Risk, PCI Compliance, Risk Models, Organization, Organizational Design, Organizational Structure, Business, Business Ideas, Business Cases, Business Development, Agile DevOps, High Code Quality, Secure Storage, Incident Response, Risk Assessment, Threat Analytics, Embedded Systems, Documentation, Technical Writing, Application Security, Containers, Product Strategy Consultant, Go-to-market Strategy, Group Policy
Frameworks
COBIT 5
Languages
JavaScript, Go, Rust
Libraries/APIs
REST APIs
Education
Bachelor's Degree in Computer Engineering
Istanbul Commerce University - Istanbul, Turkey
Certifications
ISO 22301
ISO
ITIL
HP
ISO/IEC 27001:2013 LA
ISO
Certified Ethical Hacker
EC-Council