Satyanarayana Vuppala
Verified Expert in Engineering
IT Security and Developer
Dublin, Ireland
Toptal member since October 19, 2022
Satyanarayana is a PhD and expert in security architecture, risk assessment, threat modeling, and security analytics, operations, metrics, and reporting. He has developed controls for fraud, bots, phishing, and third-party scripts and has extensive knowledge about credential validation, harvesting, hybrid fraud, Botnet, insider threat problems, and complex OWASP attacks. Satyanarayana has constructed machine-learning algorithms for cybersecurity and works with Java SE, Python, iOS, and Android.
Portfolio
Experience
Availability
Preferred Environment
Information Security
The most amazing...
...tool I've developed were dashboards using Elastic stack, LogStash, and Kibana and security analytics for critical infrastructures.
Work Experience
Information Security Group Manager, Lead Security Architect
Citigroup
- Performed architecture risk analysis and threat modeling of new and existing Citi applications. Investigated web application firewall alerts, identified attack patterns, and remediated complex attacks.
- On-boarded several businesses' web and mobile applications on perimeter security tools to protect them from automation and web-based attacks.
- Reduced 85% of credential validation and various bot-net attacks through a global-level strategy.
- Guided junior team members in strategy, execution tasks, and developing necessary scripts to improve data loss prevention and reduce an overall number of false positives.
- Provided L3 support and troubleshooting to credential validation and automated attacks. Managed security infrastructure configuration files, logs, and other artifacts to perform root cause analysis when there were issues.
- Designed and implemented dashboards or periodic status reports that communicate the health and risks of data security tools and the business and report on key metrics provided by those tools.
Senior Research Scientist, Technical Project Manager
Raytheon Technologies
- Contributed to the formulation and technical leadership of R&D projects. Developed a new global internal product cybersecurity penetration testing service within the organization.
- Designed and implemented the architecture for the European government-funded ANASTACIA IoT security project. Authored several reports to demonstrate the technology's potential to investors.
- Provided support to the firm's business development, product, and market departments. Involved in various EU proposal submissions and produced multiple publications during this tenure.
- Oversaw the design of situational awareness, the complex attack identification system. Designed threat maps for security devices using various optimization techniques.
- Implemented power side-channel attacks and attack resilience methods on the ChipWishper module using statistical approaches (multi-variate Gaussian). Constructed multi-dimensional fingerprints using monitors for authentication methods.
Research Scientist
Interdisciplinary Centre for Security, Reliability and Trust
- Developed product cybersecurity proofs-of-concept. Generated intellectual property EU-funded projects.
- Identified the non-linear trends in viewer habits through machine learning approaches in the context of high throughput satellites. Invented new algorithmic frameworks to detect anomalies at 5G edge nodes.
- Imported data sets (network telescopes) and analyzed these, visualizing them from a security context. Led a team of three PhD researchers on a 5G security topic.
Research Scientist
University of Edinburgh
- Assessed physical layer security analysis risks in 5G Millimeter-wave cellular networks. Proposed a new geometrical framework to analyze the security in IoT networks under random topologies.
- Devised mathematical procedures to model the network effects of the technology.
- Maintained a track record of state-of-the-art algorithm implementations e.g., signal processing algorithms for communication systems.
Senior Research Engineer
Jacobs University
- Completed attribute-based access management implementation using context-aware approaches. Security cluster implementation in the ZigBee stack protocol. Proposed a new lightweight handshake protocol for secure bootstrapping.
- Performed threat assessment of various routing and network protocols.
- Implemented ranging and localization signal processing techniques for developing the ZigBee-based (IEEE 802.14.5a complaint) ZIGPOS-RTLS positioning system (JAVA and MATLAB).
- Interfaced C and C++ LAPACK routines to Java environments and ported MATLAB-based location-tracking algorithms to Java-enabled platforms.
- Guided the development of new plug-ins for the newly developed iOS interfaces.
- Developed an iOS-based user interface and iPhone dongle communication interface for Smart Office and Smart Transport proofs-of-concept.
- Demonstrated experience in producing accurate results with the highest technical and mathematical rigor.
- Co-supervised bachelor of English, master of English, and master of science degree dissertations.
Senior Software Engineer
Mindtree
- Assisted with Android 2.3 application widget development.
- Developed a weather widget on Android Gingerbread.
- Completed MindTree training program within a month.
Experience
Critical Infrastrucute Security
Education
PhD in Electrical Engineering
Jacobs University Bremen - Germany
Master's Degree in Information Security
National Institute of Technology - Durgapur, India
Bachelor of Technology Degree in Computer Science
Jawaharlal Nehru Technological University - India
Certifications
CISSP
ISC2
SMIEEE
IEEE
Skills
Tools
Jira, MATLAB
Industry Expertise
Cybersecurity
Paradigms
API Architecture, DevSecOps
Platforms
Java SE 6, Amazon Web Services (AWS), iOS, Android
Languages
Python 3
Other
Information Security, Research, Security Architecture, Web Application Firewall (WAF), Application Security, Threat Intelligence, Security Operations Centers (SOC), IT Project Management, Cloud Security, Architecture, IoT Security, Risk Assessment, Machine Learning, Dashboards, ServiceNow, CISSP, IT Security, Threat Modeling, Security, Communication, Identity & Access Management (IAM)
How to Work with Toptal
Toptal matches you directly with global industry experts from our network in hours—not weeks or months.
Share your needs
Choose your talent
Start your risk-free talent trial
Top talent is in high demand.
Start hiring