Rajesh Sayal, Developer in Gurugram, Haryana, India
Rajesh is available for hire
Hire Rajesh

Rajesh Sayal

Verified Expert  in Engineering

Cybersecurity Engineer and Developer

Location
Gurugram, Haryana, India
Toptal Member Since
November 29, 2022

Rajesh is a cybersecurity leader with 17+ years of experience ensuring the delivery of quality services within the defined SLA for client satisfaction. He specializes in IT service and infrastructure management, security operations center (SOC) functions, information security and governance, vulnerability management, application security, identity and access management (IAM), cloud security, and risk assessment. Rajesh is also skilled in developing and managing a high-performance team.

Portfolio

Guardian Insurance
Cybersecurity, Business Strategy, Network Configuration, IDS/IPS...
Deloitte
Cybersecurity, Risk Assessment, Risk Management, Web Security...
BT Group
IT Security, Monitoring, Security Audits

Experience

Availability

Part-time

Preferred Environment

Windows 10

The most amazing...

...project I've handled involved risk assessment, cybersecurity, governance, vulnerability management, application security, IAM, and cloud and data security.

Work Experience

Delivery Manager

2020 - 2023
Guardian Insurance
  • Maintained the cybersecurity risk management framework for addressing the overall approach to handling cybersecurity.
  • Ensured all controls were defined to confirm all regulatory requirements were met, designed effectively with clear documentation, and implemented.
  • Led the solution design delivery and implementation migration as part of a global transition transformation project, including firewall transition from Juniper and Cisco's firewalls to Palo Alto's firewall platform and Trend Micro Deep Security.
  • Handled intrusion prevention system (IPS), data loss prevention (DLP), intrusion detection system (IDS), and Ethereum virtual machine (EVM).
Technologies: Cybersecurity, Business Strategy, Network Configuration, IDS/IPS, Database Security, Monitoring, SOC 2, Computer Security, Identity & Access Management (IAM), Security Audits, Threat Modeling, Security Management, Static Application Security Testing (SAST), Endpoint Security, CrowdStrike, ConfigServer Security & Firewall (CSF), GRC, CompTIA Security+ Certification

Cyber Risk Manager

2018 - 2020
Deloitte
  • Led the formulation of a client's transformation strategy for their cyber architecture and resilience next-generation cyber defense center, IAM, and application security and governance.
  • Drove the security architecture and threat analysis and presented weekly and monthly project dashboards to the steering committee, comprised of sponsors, CTO, CIO, CISO, and CEO.
  • Handled multiple cybersecurity projects, teams, and organization-wide cybersecurity awareness programs for data security and privacy.
  • Demonstrated expertise in HIPAA, the NIST Cybersecurity Framework, ISO 27001, GDPR, CSA Cloud Controls Matrix, CIS Benchmarks, Owasp Top 10, SOC 2, Payment Card Industry Data Security Standard, TOGAF, and the Zero Trust Architecture.
  • Designed and developed an enterprise cybersecurity strategy and architecture, reviewing security policies, risk management, and mitigation.
  • Spearheaded a team of at least 35 people and led, onboarded, mentored, and trained fellow team members on cybersecurity domains.
  • Steered project deliveries from initiation to monitoring and control, including initial planning, estimating, scheduling, integrating change control, and planning risk responses and contingencies.
  • Developed business strategies and architectural designs, overseeing the deployment of systems, cybersecurity, network security, and endpoint technologies.
  • Delivered security and risk management consultancy services on infrastructure and IT applications, coordinating the execution of audits and ensuring adherence to regulatory compliance.
  • Contributed to the layered security architecture, application and endpoint security, data security compliance and regulation, threat exposure and incident management, security operations, and digital forensics.
Technologies: Cybersecurity, Risk Assessment, Risk Management, Web Security, Security Architecture, Cloud Security, Application Security, Vulnerability Management, Enterprise Risk Management (ERM), Security, Authentication, Vulnerability Identification, Cloud, APIs, Azure, NIST, Vulnerability Assessment, IT Audits, Penetration Testing, Compliance, GDPR, SecOps, PCI, Networks, SIEM, Database Security, Monitoring, SOC 2, Security Audits

Senior Security Specialist

2012 - 2018
BT Group
  • Acted as a core member of the information security team and managed the delivery of operational services provided against the security framework. Monitored compliance, cybersecurity, and information security and formulated policies and procedures.
  • Delivered security systems with firewall, IPS, IDS, EVM, DLP, and proxy.
  • Conducted detailed risk analyses and assessments to understand and explain client problems and provided clients with up-to-date information on threats and security vulnerabilities that organizations may face.
  • Delivered security systems with host intrusion prevention system (HIPS), advanced persistent threat (APT), security information and event management (SIEM), security operation center (SOC), and identity and access management (IdAM).
Technologies: IT Security, Monitoring, Security Audits

Senior Engineer

2009 - 2013
Wipro
  • Conducted end-to-end product implementation, designed vendor assessment framework, and evaluated vendors.
  • Worked actively on 10+ projects related to network security and cybersecurity, Trend Micro's APT, TippingPoint DSM, HIPS, network access control (NAC), IDaM, deployment of F5's secure sockets layer (SSL), SIEM, and DLP.
  • Reviewed security policies, mitigated risks, and improved services. Worked on request for proposal (RFP), request for quote (RFQ), and bill of materials (BOM).
  • Led the delivery of projects from initiation to monitoring and control, including planning and estimation.
  • Provided security and risk management consulting services and resolved security escalations related to infrastructure and IT applications. Coordinated the execution of audits and ensured regulatory compliance.
Technologies: Networks, Intrusion Prevention Systems (IPS), Firewalls, Email

Security Portfolio Merger and Acquisition

Designed and developed the enterprise cybersecurity strategy and architecture, reviewing security policies, risk management and mitigation, service improvements, as-is assessments, and to-be roadmaps of Fortune 500 organizations.

I set up security configuration baselines and cloud-specific benchmarks, identified and analyzed the associated risk, and prioritized security violations and continuous security checks. I also determined lead risks in business processes, operations, information security programs, and technology projects by engaging technical and strategic objectives. Additionally, I rendered technical solutions and steered pipeline projects' E2E requests for proposal and information, statements of work, and master service agreements, covering planning, monitoring, control, and defense-in-depth implementation.

Finally, I conducted the E2E product implementation and vendor assessment framework design, vendor evaluation, contracting, and SLA framework design for 10+ projects, including network and cybersecurity, Trend Micro advanced persistent threats, device support module and TippingPoint, host intrusion prevention system, NAC, IAM, F5 SSL deployment, security information and event management, and data loss prevention.

Cyber Project Delivery

I implemented the end-to-end product for a cyber project, including vendor assessment framework design, vendor evaluation, and SLA framework design. Some of the technologies and processes involved were Trend Micro's APT, the device support module, TippingPoint, HIPS, NAC, IdAM, F5 SSL deployment, SIEM, and DLP.

Industry Expertise

Cybersecurity, Network Security, Insurance

Storage

Database Security

Other

Information Systems, Firewalls, Antivirus Software, IT Project Management, Information Security, IT Systems Architecture, Risk Assessment, Cloud Security, IT Infrastructure, Vendor Management, Application Security, Vulnerability Management, Security, NIST, IT Audits, Architecture, Compliance, SecOps, IT Management, Networks, Palo Alto Networks, Cisco, Microsoft 365, Spam Filtering, Business Strategy, CISO, ISO 27001, Network Configuration, Security Audits, CompTIA Security+ Certification, Security Design, CISM, Windows 10, Operating Systems, Networking, Intrusion Prevention Systems (IPS), Lean Project Management, Risk Management, Incident Response, Incident Management, Security Architecture, Authentication, Vulnerability Identification, Cloud, Vulnerability Assessment, IT Security, Data-level Security, GDPR, WAS, PCI, SIEM, IDS/IPS, Monitoring, SOC 2, Identity & Access Management (IAM), Threat Modeling, Static Application Security Testing (SAST), Endpoint Security, CrowdStrike, Critical Security Controls (CIS Controls), Web Security, Resource Management, Enterprise Risk Management (ERM), APIs, Email, Computer Security, Security Management, GRC

Tools

pfSense, ConfigServer Security & Firewall (CSF)

Paradigms

DevSecOps, HIPAA Compliance, Penetration Testing

Platforms

Azure, Amazon Web Services (AWS)

Languages

Batch

2003 - 2006

Bachelor's Degree in Information Technology

Guru Nanak Dev University - Amritsar, Punjab, India

MAY 2020 - PRESENT

Certified Information Security Manager (CISM)

ISACA

MAY 2020 - PRESENT

Project Management Professional (PMP)

Project Management Institute (PMI)

Collaboration That Works

How to Work with Toptal

Toptal matches you directly with global industry experts from our network in hours—not weeks or months.

1

Share your needs

Discuss your requirements and refine your scope in a call with a Toptal domain expert.
2

Choose your talent

Get a short list of expertly matched talent within 24 hours to review, interview, and choose from.
3

Start your risk-free talent trial

Work with your chosen talent on a trial basis for up to two weeks. Pay only if you decide to hire them.

Top talent is in high demand.

Start hiring