Summary
Overview
Work History
Education
Skills
Certification
Projects
References
Timeline
Generic

RADHIKA SHARMA

Toronto,ON

Summary

Cybersecurity professional with focused background in identifying and mitigating security risks. Proven ability to collaborate effectively within teams to implement security measures and respond to evolving threats. Recognized for strong analytical skills and adaptability in dynamic environments.

Overview

5
5
years of professional experience
1
1
Certification

Work History

Client Service Associate

Victorian Order of Nurses (VON) - Etobicoke
07.2023 - 12.2023
  • Assigned client visits to nurses and home support workers using knowledge of local geography, client needs, and continuity of care while following collective agreement guidelines and established planning procedures
  • Received and processed client referrals and updates, responding to phone inquiries from clients, doctors, service providers, and other agencies, advanced scheduling, daily scheduling changes (i.e., sick calls, client cancelations, new client admissions), and other administrative duties
  • Worked closely with team members and management to ensure daily staffing levels are sufficient, and the delivery of quality client care and service are met
  • Supported clients, nurses, and home support workers to ensure delivery of quality care
  • Worked in a fast-paced environment with rapidly changing priorities while meeting daily and weekly scheduling deadlines
  • Ensured that confidential information relating to clients, work colleagues, suppliers, and VON's operations are properly protected and not disclosed to third parties.

Security Executive

Interglobe Aviation Private Ltd. - Indigo Airlines
01.2019 - 02.2023
  • Assisted in the development and enhancement of the third-party risk
    management framework to align with industry standards and regulations.
  • Facilitated the vendor on-boarding process, ensuring that all necessary due diligence and risk assessments were completed.
  • Performed detailed vendor risk assessments and communicated findings to senior management with recommended risk mitigation actions.
  • Assisted in developing plans to address non-compliance with applicable controls and tracked remediation progress to ensure alignment with established timelines.
  • Collaborated with operations and business teams to develop and implement comprehensive business continuity and crisis management plans, ensuring adherence to organizational emergency response procedures.
  • Collaborated closely with the compliance team to ensure adherence to PCI DSS, HIPAA, GDPR, and ISO standards for data security.
  • Collaborated with legal, compliance, and procurement teams to review and negotiate vendor contracts, focusing on risk mitigation and compliance clauses.
  • Managed third party risk management (TPRM) for vendors and onboard them as per risk tolerance.

Education

Cybersecurity And Threat Management -

Seneca Polytechnic
North York, ON
08.2024

Master of Computer Applications -

Amritsar College of Engineering And Technology
Amritsar, INDIA
05.2019

Bachelor of Computer Applications -

SSSS College of Commerce For Women
Amritsar, INDIA
05.2017

Skills

  • Programming Languages: Python, Java, C
  • Penetration Testing, Kali Linux and Redhat Linux
  • Phishing Awareness
  • Compliance Management
  • Vulnerability Analysis
  • Cybersecurity tools: Wireshark, Metasploit, Nmap, Open VAS
  • Security Frameworks and Standards: NIST, ISO 27001, CIS Critical Security Controls, or PCI DSS

Certification

ISC2 Certified

AWS Academy Graduate - AWS Academy Cloud Security Foundations

ISO 27001/02

Projects

Identifying and Exploiting Network and Web Vulnerabilities in Metasploitable2

  • Vulnerabilities like Telnet Login, WebDAV, DVWA, Distcc, Samba and PHP CGI Injection were found using various methods like Nmap and other tools.
  • Successful attempts were made to get access to Metasploitable2.
  • Detailed vulnerability report was created specifying the finding name, affected resources, method of finding, impacts, risks, and likelihood.
  • Specified various recommendations to fix or eliminate the vulnerabilities.


Implementing an Security Incident & Event Management (SIEM) Solution with AlienVault SOC

  • Implement, configure, and optimize a Security Information and Event Management (SIEM) solution using AlienVault's Unified Security Management (USM) platform, focusing on a SOC environment.
  • Deploy a SIEM solution in a medium-sized organization to monitor, detect, and respond to cybersecurity threats in real time.
  • Set up the AlienVault USM environment, configure network and device log sources, create custom correlation rules to identify potential security incidents, and develop dashboards for security monitoring.

References

Available Upon Request

Timeline

Client Service Associate

Victorian Order of Nurses (VON) - Etobicoke
07.2023 - 12.2023

Security Executive

Interglobe Aviation Private Ltd. - Indigo Airlines
01.2019 - 02.2023

ISC2 Certified

AWS Academy Graduate - AWS Academy Cloud Security Foundations

ISO 27001/02

Cybersecurity And Threat Management -

Seneca Polytechnic

Master of Computer Applications -

Amritsar College of Engineering And Technology

Bachelor of Computer Applications -

SSSS College of Commerce For Women
RADHIKA SHARMA