Karl M.

Karl M.

Senior Software Engineer

London, United Kingdom
Hire Karl M. Hire Karl M. Hire Karl M.

About Me

With over 15 years of experience in Information Technology, I have developed expertise in various areas including Cloud Engineering, Product Security and Compliance, Solution Architecture, Cybersecurity, System Automation, DevSecOps, Auditing and Compliance, Business Continuity, Cloud Management (AWS, Azure, Google), Database, Linux & VMware Admin. I'm also proud to have contributed to the second edition of 'CISA' published by Packt.

DevSecOps Fuzz Testing Security Software Development Penetration Testing HIPAA Compliance .NET Security Model Amazon Web Services (AWS) Kubernetes Sharepoint Azure Google Cloud Platform (GCP) Oracle Databases QualysGuard PostgreSQL Amazon S3 (AWS S3) Database Security CyberSecurity Data Centers Information Security Network Security Cloud Security Vulnerability Management CISSP Identity & Access Management (IAM) Security Authentication Vulnerability Identification Cloud IT Security IT Audits IT Systems Architecture Disaster Recovery Plans (DRP) Migration Security Architecture Software Development Lifecycle (SDLC) Middleware Architecture Compliance Monitoring ISO 27001 CyberArk Information Audits NIST Software Architecture Vulnerability Assessment Risk Management Threat Modeling Security Testing Solution Architecture SecOps Application Security AWS DevOps CI/CD Pipelines Network Protocols Networks Security Analysis Access Control AWS Certified Solution Architect Secure Containers Containers Container Orchestration OWASP SIEM SOC 2 Single Sign-on (SSO) Asset Management Endpoint Security Security Audits OAuth Security Management Security Engineering IT Governance Business Continuity Information Asset Protection Information Gathering Hacking Cloud Computing Cryptography Information System Audits Information Security Management Systems (ISMS) PCI DSS PCI Compliance HITRUST Certification APIs Online Banking Core Banking Systems Know Your Customer (KYC) API Gateways Host-based Security Systems (HBSS) Data Center Migration IT Automation Web Security System Design Communication CISO Assets Coding Ethical Hacking Information Systems Acquisitions Development Implementation Operations IT Management Web Applications Wireless Networking Okta Security Assessment Risk GRC Rapid7 Solutions IDS/IPS Antivirus Software Blockchain & Cryptocurrency GitHub Actions Go SAML C#.NET AWS IAM OpenID Python Splunk Azure Key Vault SonarQube Jenkins .NET Github Windows PowerShell

Work history

Cyberassuranze
Information Security Architect
2023 - Present (1 year)
Remote
    Lloyds Banking Group
    Information Security Architect
    2023 - 2023
    Remote
      Genesys
      Product Security and Compliance Manager
      2021 - 2022 (1 year)
        Letshego Microfinance Bank
        Technical Consultant
        2017 - 2021 (4 years)
          Nedbank Group
          Solution Architect
          2015 - 2017 (2 years)
            Bancabc
            Consultant
            2012 - 2015 (3 years)

              Portfolio

              Privileged Access Management Product

              The Privileged Access Management (PAM) product serves as an essential tool for managing privileged access within an enterprise, specifically catering to critical administrative users. I had the honor of spearheading the design and overseeing the development of the PAM solution, which includes key features such as a robust password vault, sophisticated workflow user management capabilities, and seamless integration with prominent platforms like LDAP, AWS, Azure, as well as various network and database tools for administrative users.

              AWS System Design

              I strategically designed the AWS system and services in accordance with the established on-premises requirement, effecting a seamless migration to AWS, while diligently validating the system's functionality. Skillfully deployed the CIS benchmark standards, empowering the AWS monitoring services including CloudTrail, CloudWatch, Security Hub, and the web application firewall (WAF).

              DevSecOps

              Executed the incorporation of DevSecOps practices by utilizing the CD/CI Jenkins pipeline. Orchestrated the deployment of CheckMarx, Black Duck, OWASP ZAP, Nessus, and PrismaCloud, contributing to the implementation of SAST, DAST, container scan, network scan, and vulnerability management components within the Business As Usual framework. Collaborated closely with the development team to proactively address and resolve crucial and significant vulnerabilities.

              Cloud Security

              Accomplishments: - Spearheaded the development of policies concerning microservices, DevSecOps tooling standards, and security incident management. - Successfully integrated GCP Security Command Center with Jira to centralize security incident management. - Implemented Lacework to bolster threat detection capabilities and enhance compliance monitoring. - Efficiently deployed SonarQube for comprehensive code quality assessment and vulnerability scanning. - Demonstrated competence in handling third-party library scans through Graye to prevent potential vulnerabilities. - Successfully implemented Reblaze's WAF technology for robust web application security. - Effectively managed log data using DataDog for enhanced monitoring and incident response. - Showcased proficiency in managing GRC and ISO27001 controls to ensure regulatory compliance.

              Ops Sec

              Key Contributions: - Oversight of operational security for platforms such as Datadog, GCP security command center, and SonarQube. - Execution of ISO 27001 implementation. - Proficient management of risk assessment and mitigation. - Collaboration on diverse projects involving the integration of DevSecOps tools and vulnerability in the CI/CD pipeline. - Conducting comprehensive reviews of code utilizing SonarQube and performing meticulous manual testing through Burp Suite.

              Risk-based Vulnerability Management

              Duties include: - Automating the integration of various vulnerability sources (Qualys, DevSecOps scan, and cloud projects) into the Central repository. - Coordinating with client risk management to establish mapping. - Prioritizing vulnerabilities based on risk assessment. - Ensuring compliance with company policy violations. - Identifying control weaknesses through mapping. - Implementing automation through the Jira ticket system. - Collaborating with asset owners and cross-functional teams to remediate vulnerabilities.

              DevOps Pipeline Setup With GCP and GitHub

              Contributions: Established a GitHub repository to serve as the centralized location for hosting the project's source code and configurations. Efficiently managed access control for the repository, facilitating developer permissions. Implemented a robust CI/CD pipeline utilizing GitHub Actions, enabling seamless automation of builds and deployments. Configured distinct workflows for development, testing, and production environments to uphold code quality and reliability. Successfully integrated the project with Google Cloud Platform services, ensuring seamless collaboration. Effectively utilized GCP Cloud Run for the deployment and scaling of containerized applications, while leveraging GCP Cloud Build to automate build processes and resource provisioning. Engineered an approval workflow within GitHub, facilitating controlled code promotion. Additionally, designed a comprehensive system for code reviews and approvals, ensuring the smooth transition of code changes across environments.

              Education

              Education
              B.Tech
              Madras University
              2000 - 2003 (3 years)