$$$$
{{ $t($store.state.user.experience_value_in_dollars) }}
Expert
{{ $t($store.state.user.experience_search_name) }}
0
jobs
Sanjay Sharma
,
, United Kingdom
Experience
Other titles
Skills
I'm offering
Markets
United Kingdom
Links for more
Once you have created a company account and a job, you can access the profiles links.
Language
English
Fluently
My experience
2015 - ?
freelance
Independent Contractor
unknown.
Employer
2015 - 2020
temp
IT Security Analyst (Contract position)
FTE of Tata Consultancy Services.
1. Review privacy impact assessments and vendor security assessments
conducted by the managed services teams.
2. Respond to data privacy incidents and investigate; Work with SOC, legal
privacy and DPWG (data privacy working group) for data breach
notifications etc.
Activities
3. Work on Security/ Data Privacy project deliverables
4. Vendor Security Assessments
5. Coordination with business on security and data privacy issues
6. Assess data loss on account of loss of digital assets and mobile devices
7. Draft / review standard Security/Privacy procedures, work instructions etc.
8. Metrics preparation on security and data privacy for steering committee
9. Review GDPR compliance of web applications and mobile applications in respect of cookie notice, privacy notice and capture of personal data.
10. Conduct UATs for Security/ Privacy digitization projects
11. Review MSA, SOWs, WOs for security & data privacy riders on request
12. Administration of enterprise secure wipe tools for company's digital assets
and mobile devices.
13. Conduct gap analysis in respect of security controls for GRC tool
14. Process optimization and enhancing IT security & data privacy policies,
procedures & work instructions
15. Team leadership, mentoring and trainings on security and data privacy.
Gilead Science engages multiple vendors for specialized IT services and
solutions in the pharmaceutical domain including Clinical research, HCP / patient enrolment, occupational health etc.
This project's objective is to evaluate and mitigate the IT and Data privacy risks to scoped data and company's IT infrastructure emanating from vendor services
/ solutions. This involves gap-analysis of the vendor security standards in the
Project context of delivery of scoped services and data. These findings feed into GRC
framework and are reviewed periodically. Santa Fe Group's SIG questionnaires
provide the security baseline for such analysis. Vendor Assessment reports
signals necessary approval for IT Project managers, Vendor procurement &
Legal teams and Data privacy teams. Cases of data privacy breaches by the
contracted vendors are required to be responded to and investigated as per the provisions of respective contract agreements.
Client Name Deutsche Bank, London, UK
TAM (Technical Access Management) Risk reduction and Process
Project Title
Improvement initiative.
conducted by the managed services teams.
2. Respond to data privacy incidents and investigate; Work with SOC, legal
privacy and DPWG (data privacy working group) for data breach
notifications etc.
Activities
3. Work on Security/ Data Privacy project deliverables
4. Vendor Security Assessments
5. Coordination with business on security and data privacy issues
6. Assess data loss on account of loss of digital assets and mobile devices
7. Draft / review standard Security/Privacy procedures, work instructions etc.
8. Metrics preparation on security and data privacy for steering committee
9. Review GDPR compliance of web applications and mobile applications in respect of cookie notice, privacy notice and capture of personal data.
10. Conduct UATs for Security/ Privacy digitization projects
11. Review MSA, SOWs, WOs for security & data privacy riders on request
12. Administration of enterprise secure wipe tools for company's digital assets
and mobile devices.
13. Conduct gap analysis in respect of security controls for GRC tool
14. Process optimization and enhancing IT security & data privacy policies,
procedures & work instructions
15. Team leadership, mentoring and trainings on security and data privacy.
Gilead Science engages multiple vendors for specialized IT services and
solutions in the pharmaceutical domain including Clinical research, HCP / patient enrolment, occupational health etc.
This project's objective is to evaluate and mitigate the IT and Data privacy risks to scoped data and company's IT infrastructure emanating from vendor services
/ solutions. This involves gap-analysis of the vendor security standards in the
Project context of delivery of scoped services and data. These findings feed into GRC
framework and are reviewed periodically. Santa Fe Group's SIG questionnaires
provide the security baseline for such analysis. Vendor Assessment reports
signals necessary approval for IT Project managers, Vendor procurement &
Legal teams and Data privacy teams. Cases of data privacy breaches by the
contracted vendors are required to be responded to and investigated as per the provisions of respective contract agreements.
Client Name Deutsche Bank, London, UK
TAM (Technical Access Management) Risk reduction and Process
Project Title
Improvement initiative.
Compliance, Cookie, Framework, Access management, Enterprise, Web, Health, Science, Assessment, Analyst, Infrastructure, It, Process optimization, Administration, Pharmaceutical, Security, GDPR Compliance, GDpr, Management, Leadership, It infrastructure, Procurement, Mentoring, Team Leadership, Research
2019 - 2020
job
Director
Board of ISACA London.
Currently, serving as 'Volunteer Compliance Officer' for data privacy for ISACA, London. During
2019-20, Served as a Director in the Board of ISACA London.
2019-20, Served as a Director in the Board of ISACA London.
Compliance
2012 - 2014
freelance
Security Consultant
unknown.
1. Lead for incident response and cyber forensics.
2. Oversee incident management activities by global team of security managers
Activities across TCS; Provide incident oversight to corporate leadership
3. Lead, assist & guide investigation of critical incidents.
4. Manage cyber forensics lab for evidence analysis, malware analysis
5. Interface with law enforcement, CERT and 3rd party vendors in respect of security incidents.
6. Presentations on information security @ TCS to (TCS) clients
7. Respond to RFPs
8. Train security managers on incident response, incident management,
computer forensics, log analysis, registry analysis
9. Enhance security procedures and processes and incident handling guidelines.
10. Functional owner of enterprise application for incident management
11. Security audits including IQMS (integrated quality management system) and risk assessments.
12. Information security manager for local establishment
13. Conduct security awareness trainings and BCP planning.
Project TCS Internal
Project Location TCS New Delhi
2. Oversee incident management activities by global team of security managers
Activities across TCS; Provide incident oversight to corporate leadership
3. Lead, assist & guide investigation of critical incidents.
4. Manage cyber forensics lab for evidence analysis, malware analysis
5. Interface with law enforcement, CERT and 3rd party vendors in respect of security incidents.
6. Presentations on information security @ TCS to (TCS) clients
7. Respond to RFPs
8. Train security managers on incident response, incident management,
computer forensics, log analysis, registry analysis
9. Enhance security procedures and processes and incident handling guidelines.
10. Functional owner of enterprise application for incident management
11. Security audits including IQMS (integrated quality management system) and risk assessments.
12. Information security manager for local establishment
13. Conduct security awareness trainings and BCP planning.
Project TCS Internal
Project Location TCS New Delhi
Information Security, Leadership, Management, Security, Quality Management, Incident Management, Guide, Enterprise, Processes, Manager
1996 - 2007
job
Investigation Officer
Central Bureau of Investigation.
Position Investigation Officer
Investigating Cyber Crime, Anti-Corruption cases, Economic Offences etc.
Manage Enterprise wide Oracle application for tracking Crime cases
Set up Digital Forensic lab and conduct forensic examinations of digital evidence
Execute court warrants (equivalent to Subpoena in USA) and depose before
Investigating Cyber Crime, Anti-Corruption cases, Economic Offences etc.
Manage Enterprise wide Oracle application for tracking Crime cases
Set up Digital Forensic lab and conduct forensic examinations of digital evidence
Execute court warrants (equivalent to Subpoena in USA) and depose before
Oracle, Enterprise, USA, UP
My education
Patna University
Masters, Finance
Masters, Finance
Regional Computer Center
Somepostgraduate, N/a
Somepostgraduate, N/a
St Xaviers College
BSc, Physics
BSc, Physics
Sanjay's reviews
Sanjay has not received any reviews on Worksome.
Contact Sanjay Sharma
Worksome removes the expensive intermediaries and gives you direct contact with relevant talent.
Create a login and get the opportunity to write to Sanjay directly in Worksome.
38100+ qualified freelancers
are ready to help you
Tell us what you need help with
and get specific bids from skilled talent in Denmark