Amila Udayanka Wanniarachchi
අමිල උදයංක වන්නිආරච්චි
Son, Brother, Hubby, Dad & Security Bloke.
Technology is an amazing sector to be in, things change all the time and new technology make the impossible become possible.
Security | Architecture | Design | Delivery | Governance | Assurance
Innovative, highly dynamic security architecture, design and delivery professional with fifteen years of career success in various network and cloud security domains. Ability to provide security insights to the business, in their language and articulated the business benefits. Results oriented professional recognised for leadership as well as a team member and individual contributor taking on major initiatives, adapting to rapidly changing environments.
- Clear Communicator
- Creative Problem Solver
- Customer Driven
- Collaborative to Deliver
- Agile to Win
- Inspire and Influence Others
- Research and Innovation
Architecture, Design and Delivery
- Enterprise and mobile core security architecture and cross-domain security design, development and delivery.
- Security transformation, standards, compliance and guidelines for end to end solutions and technologies.
- Cloud security and service models (SaaS, PaaS and IaaS) with basic NFV, SDN and automation knowledge.
- NIST Cyber Security Framework, ISO/IEC 27001/27002, PCI-DSS and GDPR.
- TOGAF Architecture Development, TM Forum eTOM, SID and TAM Framework Knowledge.
- CIS Critical Security Controls, Cyber Essentials and NCSC Security Principles and Guidance.
- Security architecture life-cycle, road-map and policy development. Information Security Governance and Assurance.
Technologies, Tools and Controls
- Amazon Web Services (AWS) and Microsoft Azure Cloud Infrastructure and Security Technologies.
- Check Point Gaia, SecurePlatform and IP Appliances Firewalls, Software Blades, and Endpoint Security.
- Cisco ASA, FWSM and IOS Firewalls, Firepower, ACS and ISE, AnyConnect VPN, Email and Web Security.
- Fortinet Fortigate Next-Generation Firewall (NGFW) FortiManager, FortiAnalyzer, and Endpoint Security.
- Tufin SecureTrack Security Policy Management and Qualys Cloud Platform Vulnerability and Compliance.
- Splunk Enterprise and Splunk Enterprise Security, an analytics-driven SIEM Solution.
- Arbor DDoS Detection and Mitigation and Akamai Cloud-based Web Application Firewall.