profile-pic

Suraj Bagad

Vetted Talent

Suraj Bagad

Vetted Talent
With over 18 years of experience in the field of security and software architecture, I have honed my skills in the areas of endpoint device security, C/C++ programming, and software architecture. Throughout my career, I have actively contributed to the development and implementation of robust security measures, ensuring the protection of sensitive data and systems. My extensive knowledge and expertise in security protocols, coupled with my proficiency in programming languages such as C/C++, have allowed me to design and create innovative security software solutions. As an experienced professional in the field, I am dedicated to continuously enhancing security practices and staying ahead of emerging threats to provide optimal protection for organizations and their valuable assets.
  • Role

    Security Technical Consultant

  • Years of Experience

    18 years

Skillsets

  • Security - 16 Years
  • C/C++ - 16 Years
  • Endpoint Device Security - 15 Years
  • Software Architecture - 2 Years
  • GIT / SVN - 3 Years
  • cURL - 2 Years
  • Django - 1 Years
  • Python - 1 Years
  • SOC2/1 audits - 8 Years
  • Threat Modelling - 8 Years

Vetted For

7Skills
  • Roles & Skills
  • Results
  • Details
  • icon-skill_image
    Product Security EngineerAI Screening
  • 59%
    icon-arrow-down
  • Skills assessed :Familiarity with fintech., open source contributions, Conduct design reviews, identify threats and suggest mitigations, penetration tests, SOC2/1 audits, Update the threat model and implement mitigations.
  • Score: 59/100

Professional Summary

18Years
  • Aug, 2022 - May, 2023 9 months

    Technical Architect

    Forcepoint
  • May, 2020 - Aug, 20222 yr 3 months

    Technical Architect

    Quick Heal
  • Jan, 2007 - May, 202013 yr 4 months

    Principal S/W Engineer

    Symantec By Broadcom
  • Aug, 2004 - Aug, 20062 yr

    Software Engineer

    Acusis
  • Aug, 2006 - Dec, 2006 4 months

    S/W Engineer

    Geomatric

Applications & Tools Known

  • icon-tool

    Wireshark

  • icon-tool

    Windows Performace Analyzer

  • icon-tool

    threat Modelling

  • icon-tool

    SOC Audit

  • icon-tool

    Mitigation

Work History

18Years

Technical Architect

Forcepoint
Aug, 2022 - May, 2023 9 months

    Responsibilities-

    • Worked on CASB, SWG, and ZTNA technology products.
    • Had overall analysis , security suggestions, technical guidance on improvement Of CASB product.
    • Present team for understanding technical topics such as Performance and Security.
    • Led architectural analysis of SASE (Secure Access Service Edge) and created Architectural diagrams.
    • Developed major features supporting SaaS MS Office applications through Azure AD And implemented security fixes based on SAST tool reports.
    • Recognizing a challenge within my team, I observed that support team members Faced difficulties coordinating with customers due to limited technical Knowledge on the ZTNA product, with no available resources for assistance.
    • To Address this issue, I proactively delved into the code, configurations, and Relevant details, leveraging my expertise to assist them in debugging customer Support issues.
    • By understanding their pain points and providing hands-on Support, I facilitated smoother communication and problem resolution, enhancing
    • Overall team efficiency.
    • Mentored team members, established interview processes.

Technical Architect

Quick Heal
May, 2020 - Aug, 20222 yr 3 months

    Responsibilities-

    • Led and optimized leading AV engine, achieving a remarkable 30% performance Improvement.
    • Oversaw team processes, identifying gaps, interaction across team, discussion With leaders, acting representative for AV engine and implementing enhancements For increased efficiency.
    • In my role, I encountered a challenge with the Windows native library code an Area that puzzled the entire team.
    • With a keen eye for complex code structures, I took the initiative to dissect and comprehend the intricate workings of these Native libraries. Not only did I unravel the complexity, but I also innovatively
    • Implemented an interactive password-based validation feature during the Windows Booting process. This feature empowered users with the choice to opt for or skip Boot-time scanning, showcasing my ability to understand, enhance, and bring User-centric solutions to intricate technological challenges.
    • Mentored team members, setup interview processes, facilitated cross-functional Collaboration, malware analysis collaboration, and conducted POC initiatives to Drive innovation.
    • Achieved the prestigious 'Bheema Award' for adeptly managing projects independently,
    • Demonstrating strong coordination skills with various stakeholders, including leaders,
    • Cross-functional team members, and internal collaborators.
    • I have helped Organisation in mitigation of threats using lot of techniques like left shift approach ( Threat modelling proactive approach) and also helped mitigation of threats using reactive approach (based on test cases results) From SOC perspective
    • Security Architecture Design: Played a key role in designing security architectures that align with SOC2 principles, incorporating robust controls and measures.
    • Compliance-Driven Development: Demonstrated a commitment to compliance by embedding SOC2 considerations (e.g. using CIS benchmarks) into the development lifecycle, proactively addressing security and privacy concerns.

Principal S/W Engineer

Symantec By Broadcom
Jan, 2007 - May, 202013 yr 4 months

    Responsibilities-

    • Developed features for diverse Security Products, including IDS, IPS, Cloud Security solutions, and Compliance products based on CIS benchmark.
    • Recognizing a critical resource gap in Windows Driver Debugging within my team And business unit, I proactively took the initiative to independently learn and Master these techniques. With only one resource available, I realized the Vulnerability this posed to our projects.
    • In alignment with my unwavering Commitment to organizational growth, I voluntarily undertook the responsibility to Address this gap, shouldering a significant portion of the driver issues.
    • This Proactive approach wasn't prompted by anyone but stemmed from my dedication to ensuring a robust and successful endpoint project.
    • Pioneered the implementation of Threat Modelling within the team, leading to robust security features and recognized with Applause awards for outstanding Contributions and customer-driven approach.
    • I used the threat modelling tool to identify the threat vectors and inputs and worked on a feature of encrypting the sensitive information using openssl AES apis In the memory itself.
    • This was done to prevent any memory attack , which can happen Due to exposure of data in plain text.
    • I worked on an SVA (Security Virtual Appliance) project for protection of VMware Based virtual machines which works on the concept of Host based Security solution.
    • Instead of installing all AVs on all VM machines, this solution will be deployed On only one machine as an Appliance. The activities of all VM machines will be Passed to this appliance using VMwares network drivers.
    • Received positive feedback and achieved top-quality ratings for excellence in Security Virtual Appliance and security compliance products. Implemented innovative
    • Functionalities for Windows Login customization in custom Active Directory Management System.
    • I started with the Active Directory project which was a custom solution for organizations for managing their organization's network using Microsoft's Active Directory technology.
    • From mitigation of threats perspective: I have helped Organisation in mitigation of threats using lot of techniques like left shift approach ( Threat modelling proactive approach) and also helped mitigation of threats using reactive approach (based on test cases results) From SOC perspective
    • Security Architecture Design: Played a key role in designing security architectures that align with SOC2 principles, incorporating robust controls and measures.
    • Compliance-Driven Development: Demonstrated a commitment to compliance by embedding SOC2 considerations (e.g. using CIS benchmarks) into the development lifecycle, proactively addressing security and privacy concerns
    • Data Protection Measures: Implemented comprehensive data protection measures within security products, ensuring compliance with SOC2 standards regarding data confidentiality, integrity, and availability.
    • Security Training and Awareness: Contributed to fostering a security-aware culture within the organization, emphasizing the importance of SOC2 principles through training programs and awareness initiatives.

S/W Engineer

Geomatric
Aug, 2006 - Dec, 2006 4 months

    Responsibilities-

    • Demonstrated expertise in working with highly complex OpenGL-based software 'Godrej Interior' utilized for office interior design.
    • Achieved substantial knowledge within a short period and effectively implemented gained knowledge in the project.
    • Recognized for exceptional performance, I received an unsolicited salary increase within just two months of joining the company, a testament to my immediate impact and dedication to delivering quality results.

Software Engineer

Acusis
Aug, 2004 - Aug, 20062 yr

    Responsibilities-

    • Developed feature additions and enhancements for client-server architecture, displaying a commitment to continuous learning in this domain.
    • Utilized COM and multithreading to optimize system performance effectively.
    • Demonstrated expertise in advanced technologies like Remoting (.NET) and web services while innovatively implementing them in a Speech Recognition project.

Testimonial

Forcepoint

Sanyam Gandhi

I have had worked with Suraj closely at Forcepoint in WebServices and Agents team. Suraj possesses a unique combination of technical expertise, leadership skills and a vast knowledge in Cyber Security domain. He is a true team player and leaded and contributed to many projects at Forcepoint. His willingness to share knowledge and helping everyone is his best strength.

Acusis

Raghunath KM

I remember Suraj as a very diligent developer and he was very tech savvy.

Major Projects

3Projects

Implement Conditional Access Policy for IDAM (Azure) for SAAS product

Forcepoint
Dec, 2022 - Mar, 2023 3 months

    Project Overview:

    Implemented a robust solution for a client seeking enhanced security measures for their Azure user authentication using Azure Identity and Access Management (IDAM). The primary goal was to block users attempting to access Azure authenticated applications without proper network or Cloud Access Security Broker (CASB) server verification.

    Key Responsibilities:

    • Requirement Analysis: Conducted a thorough analysis of the client's requirements to understand the scope and objectives of the project.
    • Impact Analysis: Identified and assessed the key areas impacted by the implementation of the enhanced authentication feature:
    • UI (User Interface): Integrated IDAP and Azure-related information seamlessly into the CASB product's settings page.
    • Backend: Implemented storage mechanisms for IDAP policy settings to ensure secure and efficient data management.
    • Operational: Facilitated the upload of trusted certificates for the reverse proxy, ensuring a secure and reliable connection.
    • Implementation: Executed the necessary changes in the backend area, guided and coordinated with other 3 team members for remaining changes.
    • Testing: Conducted rigorous testing to validate the functionality and security of the implemented solution. This included user authentication scenarios, policy enforcement, and certificate validation.
    • Documentation: Prepared comprehensive documentation detailing the implemented changes, including step-by-step guides for administrators and end-users.
    • Collaboration: Collaborated closely with cross-functional teams, including UI/UX designers, backend developers, and operational staff, to ensure a cohesive and effective implementation.

AntiVirus Engine Performance Enhancement

Quick Heal
Jun, 2021 - Jan, 2022 7 months

    Project Overview:

    Led efforts to significantly enhance the performance of an Antivirus (AV) engine widely utilized across enterprise and retail products for comprehensive malware scanning. The primary objective was to optimize the AV engine's performance, resulting in a remarkable 30% improvement.

    Key Responsibilities:

    1. Optimization of AV Engine: Undertook the responsibility of optimizing the AV engine's performance by addressing various aspects, ensuring efficient malware scanning for enterprise and retail products.
    2. Continuous Memory Presence: Redesigned the AV engine to operate as a daemon, ensuring continuous memory presence of its components. This strategic enhancement eliminated the need for reloading during scanning requests, significantly reducing turnaround time for frequent scanning requests.
    3. Definitions Footprint Reduction: Implemented a targeted file type scanning approach, specifically .dex files (Android-based), on the server to reduce the footprint of AV engine definitions. This tailored scanning approach contributed to a more streamlined and efficient engine.
    4. Cross-Team Collaboration: Collaborated with diverse teams such as Server, Malware Analysis, and Signature Writing teams. Leveraged insights from security and technical expertise to fill knowledge gaps, offering guidance to junior team members.
    5. Expanded Responsibilities to IPS Product: Took on additional responsibilities by managing the Intrusion Prevention System (IPS) product. This extended role involved ensuring the seamless integration and performance optimization of the IPS product alongside the AV engine.

Authorize Windows Boot Login Scanning

Quick Heal
Jun, 2021 - Dec, 2021 6 months

    Project Review:

    • In my role, I encountered a challenge with the Windows native library codeine area that puzzled the entire team.
    • With a keen eye for complex code structures, I took the initiative to dissect and comprehend the intricate workings of these native libraries.
    • Not only did I unravel the complexity, but I also innovatively implemented an interactive password-based validation feature during the Windows
    • Booting process.
    • This feature empowered users with the choice to opt for or skip boot-time scanning, showcasing my ability to understand, enhance, and bring
    • User-centric solutions to intricate technological challenges.

Education

  • Bachelor of Engineering - BE

    University of Mumbai (2003)

Certifications

  • CISSP

    LinkedIn (Jun, 2023)
  • secure product lifecycle

    Noble Work Foundation (Jun, 2023)
  • software architecture security

    Udemy (Feb, 2023)
  • Architect Saas Application

    Udemy (Feb, 2023)