Rajesh Sayal
Verified Expert in Engineering
Cybersecurity Engineer and Developer
Gurugram, Haryana, India
Toptal member since November 29, 2022
Rajesh is a cybersecurity leader with 17+ years of experience ensuring the delivery of quality services within the defined SLA for client satisfaction. He specializes in IT service and infrastructure management, security operations center (SOC) functions, information security and governance, vulnerability management, application security, identity and access management (IAM), cloud security, and risk assessment. Rajesh is also skilled in developing and managing a high-performance team.
Portfolio
Experience
Availability
Preferred Environment
Windows 10
The most amazing...
...project I've handled involved risk assessment, cybersecurity, governance, vulnerability management, application security, IAM, and cloud and data security.
Work Experience
Delivery Manager
Guardian Insurance
- Maintained the cybersecurity risk management framework for addressing the overall approach to handling cybersecurity.
- Ensured all controls were defined to confirm all regulatory requirements were met, designed effectively with clear documentation, and implemented.
- Led the solution design delivery and implementation migration as part of a global transition transformation project, including firewall transition from Juniper and Cisco's firewalls to Palo Alto's firewall platform and Trend Micro Deep Security.
- Handled intrusion prevention system (IPS), data loss prevention (DLP), intrusion detection system (IDS), and Ethereum virtual machine (EVM).
Cyber Risk Manager
Deloitte
- Led the formulation of a client's transformation strategy for their cyber architecture and resilience next-generation cyber defense center, IAM, and application security and governance.
- Drove the security architecture and threat analysis and presented weekly and monthly project dashboards to the steering committee, comprised of sponsors, CTO, CIO, CISO, and CEO.
- Handled multiple cybersecurity projects, teams, and organization-wide cybersecurity awareness programs for data security and privacy.
- Demonstrated expertise in HIPAA, the NIST Cybersecurity Framework, ISO 27001, GDPR, CSA Cloud Controls Matrix, CIS Benchmarks, Owasp Top 10, SOC 2, Payment Card Industry Data Security Standard, TOGAF, and the Zero Trust Architecture.
- Designed and developed an enterprise cybersecurity strategy and architecture, reviewing security policies, risk management, and mitigation.
- Spearheaded a team of at least 35 people and led, onboarded, mentored, and trained fellow team members on cybersecurity domains.
- Steered project deliveries from initiation to monitoring and control, including initial planning, estimating, scheduling, integrating change control, and planning risk responses and contingencies.
- Developed business strategies and architectural designs, overseeing the deployment of systems, cybersecurity, network security, and endpoint technologies.
- Delivered security and risk management consultancy services on infrastructure and IT applications, coordinating the execution of audits and ensuring adherence to regulatory compliance.
- Contributed to the layered security architecture, application and endpoint security, data security compliance and regulation, threat exposure and incident management, security operations, and digital forensics.
Senior Security Specialist
BT Group
- Acted as a core member of the information security team and managed the delivery of operational services provided against the security framework. Monitored compliance, cybersecurity, and information security and formulated policies and procedures.
- Delivered security systems with firewall, IPS, IDS, EVM, DLP, and proxy.
- Conducted detailed risk analyses and assessments to understand and explain client problems and provided clients with up-to-date information on threats and security vulnerabilities that organizations may face.
- Delivered security systems with host intrusion prevention system (HIPS), advanced persistent threat (APT), security information and event management (SIEM), security operation center (SOC), and identity and access management (IdAM).
Senior Engineer
Wipro
- Conducted end-to-end product implementation, designed vendor assessment framework, and evaluated vendors.
- Worked actively on 10+ projects related to network security and cybersecurity, Trend Micro's APT, TippingPoint DSM, HIPS, network access control (NAC), IDaM, deployment of F5's secure sockets layer (SSL), SIEM, and DLP.
- Reviewed security policies, mitigated risks, and improved services. Worked on request for proposal (RFP), request for quote (RFQ), and bill of materials (BOM).
- Led the delivery of projects from initiation to monitoring and control, including planning and estimation.
- Provided security and risk management consulting services and resolved security escalations related to infrastructure and IT applications. Coordinated the execution of audits and ensured regulatory compliance.
Experience
Security Portfolio Merger and Acquisition
I set up security configuration baselines and cloud-specific benchmarks, identified and analyzed the associated risk, and prioritized security violations and continuous security checks. I also determined lead risks in business processes, operations, information security programs, and technology projects by engaging technical and strategic objectives. Additionally, I rendered technical solutions and steered pipeline projects' E2E requests for proposal and information, statements of work, and master service agreements, covering planning, monitoring, control, and defense-in-depth implementation.
Finally, I conducted the E2E product implementation and vendor assessment framework design, vendor evaluation, contracting, and SLA framework design for 10+ projects, including network and cybersecurity, Trend Micro advanced persistent threats, device support module and TippingPoint, host intrusion prevention system, NAC, IAM, F5 SSL deployment, security information and event management, and data loss prevention.
Cyber Project Delivery
Education
Bachelor's Degree in Information Technology
Guru Nanak Dev University - Amritsar, Punjab, India
Certifications
Certified Information Security Manager (CISM)
ISACA
Project Management Professional (PMP)
Project Management Institute (PMI)
Skills
Tools
pfSense, ConfigServer Security & Firewall (CSF)
Industry Expertise
Cybersecurity, Network Security, Insurance
Storage
Database Security
Paradigms
DevSecOps, HIPAA Compliance, Penetration Testing
Platforms
Azure, Amazon Web Services (AWS), CrowdStrike
Languages
Batch
Other
Information Systems, Firewalls, Antivirus Software, IT Project Management, Information Security, IT Systems Architecture, Risk Assessment, Cloud Security, IT Infrastructure, Vendor Management, Application Security, Vulnerability Management, Security, NIST, IT Audits, Architecture, Compliance, SecOps, IT Management, Networks, Palo Alto Networks, Cisco, Microsoft 365, Spam Filtering, Business Strategy, CISO, ISO 27001, Network Configuration, Security Audits, CompTIA Security+ Certification, Security Design, CISM, Encryption, Windows 10, Operating Systems, Networking, Intrusion Prevention Systems (IPS), Lean Project Management, Risk Management, Incident Response, Incident Management, Security Architecture, Authentication, Vulnerability Identification, Cloud, Vulnerability Assessment, IT Security, Data-level Security, GDPR, WAS, PCI, SIEM, IDS/IPS, Monitoring, SOC 2, Identity & Access Management (IAM), Threat Modeling, Static Application Security Testing (SAST), Endpoint Security, Critical Security Controls (CIS Controls), Web Security, Resource Management, Enterprise Risk Management (ERM), APIs, Email, Computer Security, Security Management, GRC
How to Work with Toptal
Toptal matches you directly with global industry experts from our network in hours—not weeks or months.
Share your needs
Choose your talent
Start your risk-free talent trial
Top talent is in high demand.
Start hiring