Satyanarayana Vuppala, Developer in Dublin, Ireland
Satyanarayana is available for hire
Hire Satyanarayana

Satyanarayana Vuppala

Verified Expert  in Engineering

Bio

Satyanarayana is a PhD and expert in security architecture, risk assessment, threat modeling, and security analytics, operations, metrics, and reporting. He has developed controls for fraud, bots, phishing, and third-party scripts and has extensive knowledge about credential validation, harvesting, hybrid fraud, Botnet, insider threat problems, and complex OWASP attacks. Satyanarayana has constructed machine-learning algorithms for cybersecurity and works with Java SE, Python, iOS, and Android.

Availability

Part-time

Preferred Environment

Information Security

The most amazing...

...tool I've developed were dashboards using Elastic stack, LogStash, and Kibana and security analytics for critical infrastructures.

Work Experience

Information Security Group Manager, Lead Security Architect

2020 - PRESENT
Citigroup
  • Performed architecture risk analysis and threat modeling of new and existing Citi applications. Investigated web application firewall alerts, identified attack patterns, and remediated complex attacks.
  • On-boarded several businesses' web and mobile applications on perimeter security tools to protect them from automation and web-based attacks.
  • Reduced 85% of credential validation and various bot-net attacks through a global-level strategy.
  • Guided junior team members in strategy, execution tasks, and developing necessary scripts to improve data loss prevention and reduce an overall number of false positives.
  • Provided L3 support and troubleshooting to credential validation and automated attacks. Managed security infrastructure configuration files, logs, and other artifacts to perform root cause analysis when there were issues.
  • Designed and implemented dashboards or periodic status reports that communicate the health and risks of data security tools and the business and report on key metrics provided by those tools.
Technologies: Cybersecurity, Security Architecture, Risk Assessment, Application Security, Cloud Security, DevSecOps, Architecture

Senior Research Scientist, Technical Project Manager

2018 - 2020
Raytheon Technologies
  • Contributed to the formulation and technical leadership of R&D projects. Developed a new global internal product cybersecurity penetration testing service within the organization.
  • Designed and implemented the architecture for the European government-funded ANASTACIA IoT security project. Authored several reports to demonstrate the technology's potential to investors.
  • Provided support to the firm's business development, product, and market departments. Involved in various EU proposal submissions and produced multiple publications during this tenure.
  • Oversaw the design of situational awareness, the complex attack identification system. Designed threat maps for security devices using various optimization techniques.
  • Implemented power side-channel attacks and attack resilience methods on the ChipWishper module using statistical approaches (multi-variate Gaussian). Constructed multi-dimensional fingerprints using monitors for authentication methods.
Technologies: Machine Learning, Threat Intelligence, Dashboards, Identity & Access Management (IAM)

Research Scientist

2017 - 2018
Interdisciplinary Centre for Security, Reliability and Trust
  • Developed product cybersecurity proofs-of-concept. Generated intellectual property EU-funded projects.
  • Identified the non-linear trends in viewer habits through machine learning approaches in the context of high throughput satellites. Invented new algorithmic frameworks to detect anomalies at 5G edge nodes.
  • Imported data sets (network telescopes) and analyzed these, visualizing them from a security context. Led a team of three PhD researchers on a 5G security topic.
Technologies: Communication, Security

Research Scientist

2015 - 2017
University of Edinburgh
  • Assessed physical layer security analysis risks in 5G Millimeter-wave cellular networks. Proposed a new geometrical framework to analyze the security in IoT networks under random topologies.
  • Devised mathematical procedures to model the network effects of the technology.
  • Maintained a track record of state-of-the-art algorithm implementations e.g., signal processing algorithms for communication systems.
Technologies: MATLAB, Security, Communication

Senior Research Engineer

2011 - 2015
Jacobs University
  • Completed attribute-based access management implementation using context-aware approaches. Security cluster implementation in the ZigBee stack protocol. Proposed a new lightweight handshake protocol for secure bootstrapping.
  • Performed threat assessment of various routing and network protocols.
  • Implemented ranging and localization signal processing techniques for developing the ZigBee-based (IEEE 802.14.5a complaint) ZIGPOS-RTLS positioning system (JAVA and MATLAB).
  • Interfaced C and C++ LAPACK routines to Java environments and ported MATLAB-based location-tracking algorithms to Java-enabled platforms.
  • Guided the development of new plug-ins for the newly developed iOS interfaces.
  • Developed an iOS-based user interface and iPhone dongle communication interface for Smart Office and Smart Transport proofs-of-concept.
  • Demonstrated experience in producing accurate results with the highest technical and mathematical rigor.
  • Co-supervised bachelor of English, master of English, and master of science degree dissertations.
Technologies: IoT Security, MATLAB, iOS

Senior Software Engineer

2010 - 2011
Mindtree
  • Assisted with Android 2.3 application widget development.
  • Developed a weather widget on Android Gingerbread.
  • Completed MindTree training program within a month.
Technologies: Android

Critical Infrastrucute Security

Managed the design and development of dashboards (Elasticstack, LogStash, Kibana) and security analytics for critical infrastructures. Implemented an RNN auto-encoder-based anomaly detection system and contributed to insider threat detection using a constraint learning approach. Created a situational awareness, complex attack identification system. Designed threat maps for security devices using various optimization techniques, and led the design of optimal security enforcement engine to improve attack resilience.
2011 - 2014

PhD in Electrical Engineering

Jacobs University Bremen - Germany

2009 - 2011

Master's Degree in Information Security

National Institute of Technology - Durgapur, India

2005 - 2009

Bachelor of Technology Degree in Computer Science

Jawaharlal Nehru Technological University - India

JULY 2019 - AUGUST 2025

CISSP

ISC2

JUNE 2019 - PRESENT

SMIEEE

IEEE

Tools

Jira, MATLAB

Industry Expertise

Cybersecurity

Paradigms

API Architecture, DevSecOps

Platforms

Java SE 6, Amazon Web Services (AWS), iOS, Android

Languages

Python 3

Other

Information Security, Research, Security Architecture, Web Application Firewall (WAF), Application Security, Threat Intelligence, Security Operations Centers (SOC), IT Project Management, Cloud Security, Architecture, IoT Security, Risk Assessment, Machine Learning, Dashboards, ServiceNow, CISSP, IT Security, Threat Modeling, Security, Communication, Identity & Access Management (IAM)

Collaboration That Works

How to Work with Toptal

Toptal matches you directly with global industry experts from our network in hours—not weeks or months.

1

Share your needs

Discuss your requirements and refine your scope in a call with a Toptal domain expert.
2

Choose your talent

Get a short list of expertly matched talent within 24 hours to review, interview, and choose from.
3

Start your risk-free talent trial

Work with your chosen talent on a trial basis for up to two weeks. Pay only if you decide to hire them.

Top talent is in high demand.

Start hiring