Arun T.

Co-Founder and CTO at NST Cyber - Your Trusted Enterprise CTEM Partner
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
San Jose, California, United States, US
Languages
  • English -

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

5.0

/5.0
/ Based on 2 ratings
  • (2)
  • (0)
  • (0)
  • (0)
  • (0)

Filter reviews by:

Ganesh Rao

I had the opportunity to work with Arun Thomas when he joined the Netiq / Novell Sentinel team. Arun is an expert in his area.It was great to see the level of energy and commitment that Arun brought to work and the eagerness to take on challenges. Arun was a strong technical Engineer and a valuable contributor to the projects. Apart from his technical expertise, he was a great team player.

Rona Ward

Arun is the security guru of all security gurus out there! Very highly skilled, and a fantastic person! It's an honor to know him professionally!

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • CSSLP Cert Prep: 1 Secure Software Concepts
    LinkedIn
    Dec, 2020
    - Nov, 2024
  • (ISC)2 Security CISSP (ISC2-CISSP)
    (ISC)²
    May, 2011
    - Nov, 2024
  • Systems Security Certified Practitioner (SSCP)
    (ISC)²
    Jan, 2011
    - Nov, 2024
  • Information Systems Security Architecture Professional (ISSAP)
    (ISC)²
    Feb, 2021
    - Nov, 2024
  • CASP-Comptia
    CompTIA
  • CCNA SECURITY
    Cisco
  • CCNP security
    Cisco
  • CCSA
    Checkpoint Systems
  • CCSE
    Checkpoint Systems
  • CHFI Computer Hacking Forensic Investigator Certification
    EC-Council
  • CYBER THREAT INTELLIGENCE ANALYST
    EC-Council
  • Certified Ethical Hacker (CEH)
    EC-Council
  • Cisco Certified Internetwork Expert Routing and Switching (CCIE-RS)
    Cisco
  • Cisco Certified Internetwork Expert Security (CCIE-S)
    Cisco
  • ECSA
    EC-Council
  • ISSEP
    (ISC)²
  • Information Systems Security Management Professional (ISSMP)
    (ISC)²
  • JNCIA
    Juniper Networks
  • JNCIS SECURITY
    Juniper Networks
  • Licensed Penetration Tester (LPT) Master Lab
    EC-Council

Experience

    • United States
    • Computer and Network Security
    • 1 - 100 Employee
    • Co-Founder and CTO
      • Jun 2022 - Present

      NST Assure CTEM: Enhancing Cybersecurity Vigilance NST Assure CTEM (Continuous Threat Exposure Management) is an enterprise platform harnessing AI and ML to detect and manage cyber risks. It perpetually identifies exposed assets and vulnerabilities, leveraging machine learning to identify potential attack patterns. When a threat emerges, NST Assure CTEM triggers security assessments for validation and response. Key Advantages: - Continuous Monitoring:** Timely vulnerability detection enables proactive mitigation. - Machine Learning-Enhanced Detection:** Advanced algorithms spot complex threats. - Automated Assessments:** Swift validation prioritizes high-impact risks. - Prioritized Risk Identification:** Rankings enable effective resource allocation. - Swift Threat Detection and Response:** AI-driven detection minimizes response times. - Cyber Threat Informed Defense (CTID):** Actionable insights integrate seamlessly for proactive defense. - Compliance Assurance:** Generates compliance reports for regulatory adherence. For organizations dedicated to strengthening cyber resilience, NST Assure CTEM offers a potent solution. Through AI and machine learning, it empowers businesses to consistently detect, assess, and mitigate cyber security risks. In an evolving threat landscape, NST Assure CTEM stands as a robust tool to safeguard digital assets and operational integrity. www.nstcyber.ai Show less

    • India
    • Computer and Network Security
    • 1 - 100 Employee
    • Chief Technology and Innovation Officer,Board Director
      • Aug 2016 - Present

      NetSentries Technologies partners with global banks and Forbes 2000 companies across 4 continents to deliver independent audits and enterprise security assessments. 100+ International Banks Secured. 3M+ Vulnerabilities Reported & Fixed. 3000+ Enterprise Assessment Projects. 25+ Countries Across 4 Continents. 300+ Enterprises Protected. Book a free consultation with us to discuss your security testing needs. We can help you decide on the best approach to stay ahead of cyber attackers: 📧 arun@netsentries.com Show less

    • United Arab Emirates
    • IT Services and IT Consulting
    • CTO and Chief Security Architect
      • Sep 2015 - Sep 2016

      CTO & Chief Security Architect Current responsibilities include & not limited to: Works with Service Design teams to drive strong security best practices and provide code level security scanning and mitigation plans Evaluates and recommends security technologies for use throughout the enterprise. Works with all architects to drive Enterprise Architecture (EA) processes and best practices. Ensures that all security solutions, architecture design and analysis work is documented in a structured fashion. Works closely with peers in Security Operations, Security Compliance, to ensure that security reviews regarding information security technologies provide feasible requirements and are consistent with contracts, and regulations Designs in-house solutions for maintaining security posture. Proactively remains abreast of related evaluating technology trends and requirements, such as emerging standards for new technology opportunities Works with IT architects and management to stay abreast of planned and future business and technical directions as it relates to the company's evolving needs Works with project teams and unit level team members to ensure strong alignment with security policy, standards, and best practices Protects system by defining access privileges, control structures, and resources. Recognizes problems by identifying abnormalities; reporting violations. Implements security improvements by assessing current situation; Determines security violations and inefficiencies by conducting periodic audits. Identifies user requirements by researching and analyzing user needs, preferences, objectives, and working methods, studying how users consume content, including data categorization and labeling; meeting with focus groups. Identifying security gaps; evaluating and implementing enhancements. Identify the weak points of the systems. Recommend ways to improve a system’s security through both hardware and software. Show less

    • United States
    • Software Development
    • 1 - 100 Employee
    • Senior Staff Engineer / Information Security Specialist & Team Lead
      • Jul 2014 - Sep 2015

      Security Analytics Research & SIEM Product Design. Threat Intelligence Integration Research & Design. Oversee and coordinate regular activities of different SIEM development & maintenanace teams & provide Design Suggestions & Modifications. Ensure the delivery of world-class SIEM plugins , solution packs & services to meet different customer requirements. Supply technical oversight to ensure capabilities and technology is being used in SIEM Product to its most effective state. Collaborate with key stakeholders such as Senior Management, system owners and operators to ensure effective design ideas & processes are implemented for overall quality. Work closely with Customers , Presales & Technical Support Teams to analyze and resolve issues reported on SIEM platform and components. Provide Exception, C&A, and design review and approval on architecture to ensure a system of independent checks and balances are in place. Coordinate technical design/review activities with application development,enterprise architecture, information security, systems, network, and database groups to develop secure frameworks and enterprise applications. Designs the enterprise security infrastructure and architectural topology, including recommending hardware, operating system,software, and Ensure consistency and sufficient integration with existing infrastructure. Recommends and implements Design revisions as appropriate. Researches, recommends and implements changes to procedures and systems used in SIEM to enhance systems security & stability. Educates Employees / Partners to increase awareness of information security policies and best practices. Collaborates with business management to communicate product design modification , innovations & new design ides/concepts. Define use cases for different SIEM plugins & help the dev team to understand the business requirements. Assists and/or provides limited direction to lower level technical personnel. Show less

    • United States
    • Software Development
    • 700 & Above Employee
    • Information Security Architect & SME
      • May 2012 - Jul 2014

      Advanced SIEM ( STRM/QRADAR ) Implementation Assistance and Solution Providing. Work close with Professional Services team in high level SIM/SIEM ( STRM/QRADAR ) requirements. Last level SIEM ( STRM/QRADAR ) troubleshooting support. Responsible for end to end Incident Analysis & Response with different IPS/IDS , Firewalls and SIEM/SIM Tools. Responsible for Artifact Analysis & analysis of reported Security Threats Penetration Testing Vulnerability Assesment Consulting. Create and deliver PCI DSS and PA DSS awareness courses for Internal Employees & Clients. Information & Network Security Consulting and Solution Providing. Show less

    • Senior Information Security Architect & SME
      • Aug 2007 - Apr 2012

      Consult on a wide variety of Information security & network security issues. • Provide/Recommend/Engineer/Support information & network security solutions for clients. · Provide High Level Escallation & trobleshooting support on various network security issues. · Manage Monitoring soulutions like Cisco MARS · Manage , Implement & Troubleshoot Log Correlation & SIM/SIEM Solutions. · Develop & Implement Enterprise level Security Policies . · Attack modeling & trend analysis support with SIM/SIEM solutions. · Cisco/Checkpoint/ Open Source ( Snort ) IPS , IDS & IDP management , monitoring , policy rewriting & threat correlation. “ Information & Network Security Lead Engineer with close to 10 years of Core Experience “ · Managing web based content filtering with Cisco IPS , Checkpoint gateways , Microsoft ISA 2006 / Microsoft TMG Forefront 2010 & Linux based Open sourrce solutions like dansguardian. · Manage , implement & troubleshoot Load Balancing with Cisco ACEAP/ACESM & Microsoft TMG Forefront 2010 . · AntiVirus & OS Patch management • Provide BCP/DRP planning support to clients. • Provide Information Security Auditing Support to clients. • Provide Penetration Testing & Vulnerability Assessment services to clients . • Provide SIEM/SIM/Log Correlation consulting to clients. • Develop and deliver both instructor-led training and virtual classroom delivery of different Information & Network Security Courses. • Position as Team Lead/Mentor to other employees. • Teach Information & Network security courses as well as custom developed courses throughout the world as per the requirements of clients. • Responsible for content development of Information security topics as per the requirements of the clients Show less

    • System Security Consultant
      • Dec 2006 - Jun 2007

      Installation, configuration, monitoring and response to security system. • Troubleshoot Network & System level security issues. • Monitor & analyze threats real time. • Patch Management & compliance checking of end systems. • System file integrity checking. Installation, configuration, monitoring and response to security system. • Troubleshoot Network & System level security issues. • Monitor & analyze threats real time. • Patch Management & compliance checking of end systems. • System file integrity checking.

  • Aryans Infoway
    • Thiruvananthapuram Area, India
    • Security Engineer
      • Jun 2003 - Nov 2006

      • Installation, configuration, monitoring and response to security system. • Troubleshoot Network & System level security issues. • Monitor & analyze threats real time. • Patch Management & compliance checking of end systems. • System file integrity checking. • Installation, configuration, monitoring and response to security system. • Troubleshoot Network & System level security issues. • Monitor & analyze threats real time. • Patch Management & compliance checking of end systems. • System file integrity checking.

Education

  • King's College London
    Advanced Msc in Cyber Security, Cyber Security
    2019 - 2021
  • Harvard Business School Online
    Leadership Essentials, Complete
    2020 - 2020
  • Institution of Engineers of India (IEI), Kolkata
    AMIE, Electrical Engineering Technologies/Technicians
    2000 - 2003
  • Pope Pius XI HSS
    HSC, SCIENCE
    1998 - 2000

Community

You need to have a working account to view this content. Click here to join now