Summary
Overview
Work History
Education
Skills
Certification
Work Permit
Timeline
AssistantManager
M Shoeb Raihan

M Shoeb Raihan

Sydney,Australia

Summary

A results-driven and strategic Senior Cyber Security Manager with over 14 years of experience in IT and cybersecurity leadership. Extensive expertise in developing and managing comprehensive information security programs, ensuring regulatory compliance, and protecting organizations from emerging threats. Proficient in risk management, IT governance, and incident response with a proven ability to align security initiatives with business objectives. Adept at building cross-functional teams and fostering a culture of security awareness.

Overview

14
14
years of professional experience
3
3
Certification

Work History

Senior Cyber Security Manager

Western Sydney international Airport
03.2024 - Current
  • Develop and implement cybersecurity strategies and policies for both IT and OT environments and systems to build cyber resilience to withstand threats and minimise business disruption
  • Develop and implement the organization's cybersecurity strategy, framework, policies, and guidelines, ensuring alignment with business objectives
  • Provide expert strategic and technical cybersecurity guidance to senior executives, influencing decision-making on risk management, compliance, and resilience
  • Lead the development and execution of a multi-year cybersecurity roadmap, incorporating evolving threats, regulatory changes, and business priorities
  • Conduct comprehensive risk assessments, threat modeling, and security reviews to identify vulnerabilities and mitigate risks proactively
  • Oversee compliance with industry regulations and standards, including APRA CPS234 & CPS230, ASD Essential 8, and NIST guidelines
  • Lead security audits, penetration testing programs, and security exception management, ensuring continuous compliance and governance
  • Direct cybersecurity operations, including incident response, digital forensics, vulnerability management, and assurance
  • Oversee Security Information and Event Management (SIEM), Security Orchestration, Automation and Response (SOAR), and other critical security functions
  • Manage cybersecurity monitoring, detection, and response to threats in a multi-vendor, enterprise-scale environment
  • Serve as the primary cybersecurity advisor to executive leadership, the board, and key stakeholders, translating complex technical risks into business language
  • Lead and participate in security and data governance committees, ensuring a consistent application of cybersecurity policies across all technology initiatives
  • Foster strong relationships with internal teams, vendors, and regulatory bodies to drive cybersecurity improvements and compliance
  • Develop and deliver security education and awareness programs to cultivate a strong cybersecurity culture within the organization
  • Work closely with ICT Governance and Architecture teams to align security initiatives with overall IT and business strategy
  • Oversee red team engagements and purple team exercises to test and enhance cyber resilience
  • Lead cyber incident response planning and manage security breaches, ensuring rapid containment, investigation, and remediation
  • Drive the development of disaster recovery and business continuity plans, ensuring organizational preparedness against cyber threats
  • Provide strong technical leadership in security protocols, architecture, OT and IoT security, threat management, and technology risk management
  • Manage the transition of cybersecurity platforms from development to operations, ensuring seamless integration and functionality
  • Oversee procurement and management of cybersecurity services, ensuring value for investment and operational efficiency

IT Security & GRC Manager

Mizuho Bank Ltd
05.2023 - 03.2024
  • Develop and implement cybersecurity strategies and policies for both IT and OT environments and systems to build cyber resilience to withstand threats and minimise business disruption
  • Ensure the information security framework, policy, standards and guidelines are managed, integrated, quality assured and effectively communicated across the business
  • Oversee the operational and cyber security activities carried out by the infrastructure and security team based in Japan, Singapore and Sydney, ensuring the highest levels of security are maintained in line with APRA CPS 234, PCI DSS, NIST, ISO27001, OSPAR, and SOC2 compliance obligations
  • Responsible for delivery and effective operation of key security technologies across Operations and Engineering, including Anti-malware, Email & Web protection, DLP, SIEM and Vulnerability Management
  • Ensure that cyber security controls within the Cyber Security Risk Management Framework are regularly subjected to controls effectiveness testing and controls gap assessments, and that systems across the organization comply with cyber security policies, standards, and regulatory requirements
  • Develop and implement incident response plans to ensure the organisation is fully prepared to respond to cyber threats
  • Remediate findings from internal and external audits and coordinate plans of action to ensure corrective and preventive measures are in place
  • Identify, develop, collect, analyse, and continuously improve SMART Cyber Security Metrics and KRI/KCI reporting on a monthly basis
  • Establish and maintain sophisticated scalable Cybersecurity capabilities and processes to protect organization’s Assets, and Operations as well as for the early detection of signs of compromise
  • Responsible for IT vulnerability management and security threat prevention of all information assets, ensure continued patch management of systems, infrastructure and applications from security perspective; threat scenario testing and prevention
  • Regularly review threat and vulnerability advisories from various sources (e.g
  • ACSC, NCSC, CISA) and, where a control gap exists, ensure a compensating control is implemented to manage the risk exposure
  • Identify and assess information security risks in respect of third-party information security non-compliances, with reference to the organization’s information security policy framework, legal and regulatory obligations and industry best practices including (but not limited to); APRA CPS 234, CPS230, CPS231, CPS232, RBA RITS attestation, SWIFT CSP independent assessment, PCI DSS, SOC 2 Type 2, NIST Cybersecurity Framework, and ISO27001
  • Manage multiple projects with broad scope, ambiguity, and high degree of uncertainty within cybersecurity portfolio
  • Develop and implement the business continuity and other emergency and recovery plans, ensuring such plans are tested in accordance with organization frameworks
  • Create a framework to oversee and manage the release process for platforms in both production and non-production environments
  • Serve as a subject matter expert to both senior stakeholders and IT business owners on topics related to cyber security controls assurance, metrics reporting and attack surface management
  • Ensure secure business processes are maintained within engineering and change management system
  • Ability to influence, collaborate, guide a broad range of stakeholders from C-Level, Business and Technology domains to deliver results
  • Stay up-to-date with emerging security threats and trends, recommend and implement appropriate security measures
  • Communicate and collaborate with stakeholders across the organisation to promote a culture of Cyber Security awareness and compliance

Information Security Senior Analyst

PepsiCo
01.2022 - 04.2023
  • Perform SIEM-based event analysis and incident triage and perform coordination and management of security incidents and projects, remotely and onsite, with internal and external stakeholders
  • Analyse forensic information in a timely fashion and produce human readable reports for business stakeholders, insurance agencies and legal counsel
  • Ensure the NIST or Protective Security Policy Frameworks, ISO/IEC 27001 and essential 8 frameworks are followed for establishing, implementing, maintaining, and continually improving an information security management system (ISMS)
  • Work with computer/network forensics tools including Magnet AXIOM, Silo, Threat Grid, Tanium, Illusive, Armis, Qualys, KAPE etc
  • Conduct host forensics, network forensics, log analysis on cloud-based services within various platforms and basic malware analysis in support of incident response investigations
  • The NIST guidance on various aspects of information security, including risk management, security controls, incident response, and security assessment and authorization are applied and align with organization policy
  • Investigate cyber incidents using IT security tools and controls including Firewalls, SIEM, IDS/IPS, Anti-Virus, EDR, Anti-Spam/Email Filtering, WAF and Data Loss Prevention
  • Develop and, processes, continually improve playbooks processes and cyber security procedures and documentation for incident management and response
  • Determine, document, and report false positive events or alerts
  • Provide feedback on new alerts or correlation rules and reports
  • Identify attacks or attack patterns/campaign and gather information on attackers
  • Monitoring SIEM and updating and documenting the incident (ServiceNow SecOps) thoroughly and timely
  • Follow up and resolution of issues/incidents timely per SLAs
  • Manage incident tracker and provide shift handover with update to Texas and Poland team by joining the Cyber Fusion Centre (CFC) daily calls
  • Collaborating with other teams (e.g: threat defence, threat intelligence, Automation, Security Engineering, Enterprise Incident Management), across the Information Security Group
  • Monitor, detect, and report any threats directed against the clients’ networks and systems and identifying indicators of compromise
  • Coordinating research & development on new threats, monitoring dark web and working closely with team members
  • Effectively communicate and interface with users, vendors, and other IT personnel on security-related issues both technically and strategically from the executive level, to stakeholders and legal counsel
  • Create and execute program/script/query in Kusto query language, PowerShell and experience in the configuration and administration of Splunk
  • Lead end to end incident response and investigate intrusions to determine the cause and extent of the breach, by leveraging Endpoint Detection & Response (EDR – Defender, Symentec) solutions and threat intelligence sources
  • Provide mentoring and operational guidance to junior members to advance their skillsets and the teams capabilities
  • Provide timely, comprehensive and accurate information to Information Security leadership in both written and verbal communications

Service Delivery Manager

Micro Channel
08.2018 - 12.2021
  • Maintaining key client relationships, the first point of contact and liaison
  • Accountable for measuring, monitoring, and meeting service level targets
  • Manage major incident management, escalation, problem, change and release management
  • Accountable for streamlining operations and providing an outstanding client experience through Datto RMM proactive monitoring and alerting, efficient ticket management (Autotask) and the automation of repetitive technical and process-driven tasks
  • Manage key vendor contracts and relationships to ensure service delivery levels are met
  • Accountable for the successful on boarding of new managed services clients
  • Manage and review service quality to ensure the successful delivery of support services to the key client account
  • Attend and involve in presale meetings and provide solutions to clients and get new projects for the business
  • Undertake continual risk management and service improvement initiatives for areas of responsibility, including core platforms relevant to support services
  • Play a proactive role in fostering collaboration between Technology Services teams and participation in continuous service improvement initiatives to drive efficiency and automation through innovation
  • Prepare and attend monthly service review meetings with key clients including emergency meetings as required
  • Act as a point of escalation for issue communication to all stakeholders
  • Provide regular internal and external reports, on the team’s operations, services levels and other measures as required
  • Manage and conduct performance reviews for the team, and all daily, weekly and monthly management tasks and discussions to maintain a happy, healthy and engaged team
  • Effectively manage and lead root cause analysis for reducing support incidents to minimise callout cost
  • Facilitate effective communication and consultation with customers, hirers, relevant staff, and key stakeholders on all production, operational and technical-related issues
  • Ability to work with the latest, cutting-edge technologies
  • Develop a team of skilled, flexible, and customer-focused technical staff through coaching, mentoring and professional guidance
  • Create missing knowledge base articles, operational support documents and end-user information

Network Engineer

Biztech / Syncretize Pty Ltd
09.2015 - 07.2016
  • Delegated work to team members and supervised team members’ work
  • Reviewed and conducted performance appraisals for the team
  • Work with the developers, business analysts and subject matter experts to understand complex technological systems to produce integrated end-to-end solution options in Corporate IT
  • Working alongside Project Managers to develop and manage project plans, scope, variations, risk, and knowledge management
  • Developing and presenting best practices, technical concepts and technologies for innovative solutions
  • Evaluated and produced business plans and operating practices, which improved quality, increased productivity and reduced costs
  • Perform day-to-day activities primarily on security, virtualization, design/ implementation and migration, performance engineering or problem resolution projects
  • Demonstrate Network/Infrastructure Security technologies (Firewall, access control, intrusion detection, intrusion prevention, administrative access control) and Compliance (PCI, SOx, HIPAA) requirements
  • Manage and configure corporate firewall, implement security rules and mitigate network attacks
  • Configured and deployed Checkpoint VSX, Trend Hosted Email Security (HES), Site to Site and Client to Site VPNs, VLANs, ACLs, traffic shaping, monitoring and QoS
  • Act as an interface between the organization and suppliers/carriers/vendors regarding high-level technical issues
  • Perform day-to-day Business As Usual (BAU) availability and performance tasks as required
  • Provide escalated (2nd level) technical support, troubleshooting and fault rectification of technical issues related to networks, servers and networking equipment and Perform the provisioning, installation, upgrading, performance certification and operation of data networks for the clients

IT SYSTEMS AND NETWORK ADMINISTRATOR

Master Instruments Pty Ltd
04.2011 - 09.2015
  • Designing, implementing and configuration of the current network
  • Set up network connection to the Sydney, Melbourne, Queensland & Perth site via WAN/VPN tunnel
  • Manage, monitor and solve the client request from the “Kaseya service desk and ticketing system” for requests, changes and incidents
  • Conduct capacity planning and perform trend analysis of the network performance and maintain system documentation and disaster recovery plans
  • Perform system health checks and troubleshoot and resolve any network-related incidents
  • Establishing secure systems, preparing users, designing system specifications, managing system performance, securing system by using Sophos Antivirus and Symantec Endpoint Protection and Performing scheduled updates
  • Installing, configuring and administering of Microsoft Terminal server, SQL servers, Exchange server, File server and switches as well as Windows 2003, 2008R2 and 2012R2 server with active directory
  • Configuring and managing VLANs, ACLs, traffic shaping and monitoring and QoS
  • Maintaining, monitoring and troubleshooting VMware vSphere Client, v center, v motion, VMware cluster setup
  • Setup and maintain daily incremental backup and offside NAS which is copy across from main NAS to offside NAS every midnight
  • Installing and maintaining Commvault (Simpana) and Shadow Protect (Storage Craft) for taking snapshots of the servers, and desktop, protecting, managing and accessing corporate information, disaster recovery and retrieving deleted files from servers
  • Maintaining and monitoring HP Blade (BL460) performance and allocating resources as per requirements
  • Maintaining and monitoring Panasonic KX-TDE200 phone system by PBXUnified
  • Performing network monitoring for security reasons to prevent unwanted problems caused by internal employees as well as external customers and auditing to help management with network security issues and evaluating new and emerging products and technologies
  • Installing and maintaining Kaseya in server and desktop for monitoring and troubleshooting the network and desktop issues
  • Upgrading the IT infrastructure depending on the user demand and traffic requirement
  • Help defining overall network operating and security strategies and procedures
  • Designing and maintaining Firewall and VPN infrastructure
  • Installing, maintaining and updating IT devices using System Centre Configuration Manager (SCCM) and automated SOE deployments as per business requirements
  • Installing and maintaining printers in server and desktop level and define them in a group and set up the printer policy
  • Involved in the documentation of technical requirements, specifications and other information
  • Evaluating existing web design providers and looking at future requirements of E-Commerce Strategies
  • Maintaining the central database and providing the proper functionality of the Tencia software which is used by the staff for accounting, ordering, shipment, return and warranty, purchase and other sales-related activities
  • Install, maintain and upgrade the despatch software called Supply Master and host interface in a citrix environment
  • Install, maintain, upgrade and troubleshoot Crystal report and Phocas in the servers which are used by management staff as a business intelligence tool
  • Maintain and troubleshoot wrapper which is an intranet and web interface of the Tencia software and its syncs and talk to the Tencia, website and database server
  • Look after IT purchase and procurement (PC, monitor, laptop, printer, switch, router, volume licensing etc.) and yearly IT audit
  • Arrange a monthly meeting with the management team and discuss IT environment health report, infrastructure changes and recently completed projects, current business status, market development and future project discussion
  • Arrange a quarterly meeting and /or conference call with service providers and vendor teams regarding our business requirements, and developments and troubleshooting the problems
  • Contact staff regarding IT problems
  • Responding to support issues over phone, email or in person
  • Daily server checks and network monitoring

Education

Master of Science - Internetworking (Extended)

University of Technology Sydney (UTS)

Bachelor of Science - Computer Science

American International University Bangladesh (AIUB)

TAE40116 Certificate IV - Training & Assessment

HS Business School

ICT60220 Advanced Diploma - Information Technology

Sydney Business & Technology College

Skills

Leadership & Management

  • Team Leadership and Management
  • IT Strategy
  • Business Relationship Management
  • Stakeholder Management
  • Vendor and Third-Party Risk Management
  • Change Management
  • Performance Metrics
  • Decision Making
  • Negotiating
  • Conflict Resolution
  • Influencing Skills

Cybersecurity & Risk Management

  • Governance, Risk, and Compliance (GRC)
  • Security Operations
  • Cyber Defence
  • Security Tools and Technologies
  • Identity and Access Management (IAM)
  • Cloud Security
  • Business Continuity and Disaster Recovery
  • Incident Response and Management
  • Security Architecture and Design
  • Policies & Procedures
  • Security Awareness and Training
  • Security Compliance Auditing
  • Information Security Management
  • Data Privacy

IT & Technical Expertise

  • Technology Planning
  • Systems Management
  • Network Management
  • Technical Documentation
  • Service Management
  • Account Management
  • Project Management
  • Budget Management
  • Problem Resolution
  • Planning & Scheduling
  • Resource Management
  • Risk & Issue Management
  • Vendor Management
  • Support Management
  • Task Prioritization
  • Time Management
  • Ability to Work Under Pressure
  • Business Requirements
  • Splunk
  • ServiceNow SecOps
  • SailPoint
  • CyberArk
  • Trend Micro VisionOne
  • Magnet AXIOM
  • Authentic8 (Silo)
  • Threat Grid
  • Tanium
  • Prisma Cloud
  • Qualys
  • Bluecoat Proxy
  • Kape
  • Cisco Umbrella
  • Area 1
  • Okta
  • Illusive
  • Intezer
  • Armis
  • Microsoft Defender
  • Microsoft Purview
  • Advanced Hunt
  • Azure DevOps
  • Sql Lite
  • Kali Linux
  • FlareVM
  • WireShark
  • TCP Dump
  • CyberChef
  • Cisco Switch
  • Cloud Solution Architect AWS
  • Azure
  • Enterprise Security
  • Network Security
  • VMWare
  • VSphere
  • Hyper-V
  • Docker
  • Citrix
  • VPN (IP & MPLS)
  • System Administration
  • Virtualization
  • All Cisco platforms and IOS and CAT IOS
  • IBM OS390
  • IBM DS3524 SAN
  • Synology RS3412XS
  • NAS QNAP TS-410
  • Cisco Meraki series
  • Extreme Network AP
  • HP Blade (BL460)
  • Panasonic KX-TDE200 phone system
  • WatchGuard T20
  • T40
  • T80
  • M290
  • SonicWALL TZ300
  • SonicWALL NSA2600
  • Fortinet FortiGate-52E
  • Fortinet FortiGate 140D Series
  • SSL VPN-Array SPX5800
  • Accelpro
  • Cybersecurity strategy
  • Risk assessment
  • Incident response
  • Security compliance
  • Security operations
  • Threat intelligence
  • Vulnerability management
  • Security auditing
  • Stakeholder engagement
  • Team leadership
  • Project management
  • Policy development
  • Communication skills
  • Problem solving
  • Crisis management
  • Privileged access management
  • Endpoint security
  • Log analysis
  • Security information and event management
  • Security awareness training
  • Operating system security
  • Physical security
  • Access control
  • Social engineering
  • Compliance management
  • Data protection
  • Two-factor authentication
  • Security architecture
  • Application security
  • Wireless security
  • Identity management
  • Zero trust architecture
  • Security policy development
  • Network security
  • Digital forensics
  • Patch management
  • Web application security
  • Database security
  • Mobile security
  • Business continuity
  • Vendor risk management
  • Cryptographic algorithms
  • Container security
  • Disaster recovery
  • Intrusion detection
  • Virtualization security
  • Single Sign-on
  • Secure coding practices
  • Encryption technologies
  • Penetration testing
  • Public key infrastructure
  • Biometric security
  • Regulatory frameworks
  • Ethical hacking
  • Firewall configuration
  • Cloud security
  • Reverse engineering
  • Malware analysis
  • Secure socket layer and transport layer security
  • Intrusion prevention systems
  • Cybersecurity frameworks
  • Phishing awareness training
  • Software vulnerability scanning
  • Multi-factor authentication
  • Vulnerability assessment
  • Identity and Access management
  • Network access control
  • Information security policies
  • Threat intelligence analysis
  • Mobile device security
  • Digital certificates management
  • Unified threat management
  • Intrusion detection systems
  • Network security management
  • Endpoint protection platforms
  • Firewall administration
  • Social engineering defense
  • Data loss prevention
  • Wireless network security
  • Data privacy regulations
  • Incident response planning
  • Security operations center
  • Open source security tools
  • Network protocols
  • Internet of things security
  • System hardening
  • User behavior analytics
  • Ethical hacking techniques
  • Machine learning for security
  • Secure development lifecycle
  • Disaster recovery planning
  • Threat modeling
  • Security risk assessment
  • Computer forensics
  • Business continuity planning
  • Multitasking capacity
  • Compliance auditing
  • Teamwork
  • Teamwork and collaboration
  • Problem-solving

Certification

  • Certified Information Security Manager (CISM)
  • EC-Council Certified Chief Information Security Officer (C|CISO)
  • Certified in Risk and Information Systems Control (CRISC)

Work Permit

  • Australian Citizen
  • Australian Driving License

Timeline

Senior Cyber Security Manager

Western Sydney international Airport
03.2024 - Current

IT Security & GRC Manager

Mizuho Bank Ltd
05.2023 - 03.2024

Information Security Senior Analyst

PepsiCo
01.2022 - 04.2023

Service Delivery Manager

Micro Channel
08.2018 - 12.2021

Network Engineer

Biztech / Syncretize Pty Ltd
09.2015 - 07.2016

IT SYSTEMS AND NETWORK ADMINISTRATOR

Master Instruments Pty Ltd
04.2011 - 09.2015

Bachelor of Science - Computer Science

American International University Bangladesh (AIUB)

TAE40116 Certificate IV - Training & Assessment

HS Business School

ICT60220 Advanced Diploma - Information Technology

Sydney Business & Technology College

Master of Science - Internetworking (Extended)

University of Technology Sydney (UTS)
M Shoeb Raihan