Haran Mamankaran

Cybersecurity Professional

Protecting digital assets through advanced threat analysis, penetration testing, and security architecture. Specialized in incident response, vulnerability assessment, and security compliance frameworks.

EC Council Certified ISACA Certified Comptia Certified INE Certified

About Me

Dedicated cybersecurity professional with 8+ years of experience protecting organizations from evolving cyber threats and ensuring robust security postures.

My Journey

With over 15 years of experience in the cybersecurity landscape, my journey has been driven by an enduring passion for both breaking and building secure systems. What began as a curiosity about vulnerabilities evolved into a lifelong commitment to protecting critical infrastructure, empowering others, and shaping the future of cybersecurity.

Iโ€™ve had the privilege to work across financial sector, healthcare sector, and government agencies, leading initiatives to safeguard sensitive data and harden digital environments against evolving threats.

Beyond operational security, I actively contribute to the cybersecurity research community, explore emerging threat landscapes, and share insights through:

  • Mentoring students and emerging professionals
  • Speaking at global conferences and panels
  • Publishing research and tools that enhance industry understanding
  • Organizing and contributing to cybersecurity events such as BSides

With a rare blend of technical depth, strategic vision, and a drive to give back to the community, I continue to support the next generation of cybersecurity leaders while staying on the frontlines of threat defense.

Specializations

  • Penetration Testing & Vulnerability Assessment
  • Incident Response & Digital Forensics
  • Security Architecture & Risk Assessment
  • Compliance & Governance (SOX, HIPAA, PCI-DSS)

Security First

Proactive threat prevention and mitigation

Threat Hunting

Advanced persistent threat detection

Team Leadership

Leading security operations teams

Rapid Response

Quick incident response and recovery

Education & Qualifications

Strong academic foundation in cybersecurity and computer science, complemented by industry certifications and continuous professional development.

Master of Business Administration - MBA

London Metropolitan University

๐Ÿ“… 2019 - 2021

Postgraduate Diploma in Cyber Security And Digital Forensics

University of Westminster

๐Ÿ“… 2022 - 2024

Master of Science in Information Security

Asia e University

๐Ÿ“… 2014 - 2018

Certifications & Credentials

Industry-recognized certifications demonstrating expertise across multiple cybersecurity domains and continuous professional development.

C|CISO Logo

Certified Chief Information Security Officer (C|CISO)

Certification Number: ECC6832740159

Issuer: EC-Council

Issued On: October 27, 2024

Key Skills: Leads technically skilled teams, establishes efficient security processes, and tackles evolving cybersecurity threats.
๐Ÿ”— Verify Credential

CEI Logo

Certified EC-Council Instructor v2 (CEI)

Certification Number: ECC5647983210

Issuer: EC-Council

Issued On: June 19, 2022

Key Skills: Strong technical background, high teaching standards, and engaging instructional methods.
๐Ÿ”— Verify Credential

LPT Logo

Licensed Penetration Tester (LPT)

Certification Number: ECC11654768503

Issuer: EC-Council

Issued On: June 22, 2015

Key Skills: Advanced penetration testing methodology, real-world exploit analysis, and strong knowledge of compliance-driven security testing.
๐Ÿ”— Verify Credential

E|CIH Logo

EC-Council Certified Incident Handler (E|CIH)

Certification Number: ECC0921386745

Issuer: EC-Council

Issued On: October 9, 2021

Key Skills: Create incident response policies, manage network attacks, contain insider threats, and handle malware-based incidents.
๐Ÿ”— Verify Credential

CSA Logo

Certified SOC Analyst v1 (CSA)

Certification Number: ECC8417063592

Issuer: EC-Council

Issued On: March 6, 2025

Key Skills: Centralized log management, SIEM use case development, alert triage, incident response, and deep understanding of log-event relationships.
๐Ÿ”— Verify Credential

ECSA Logo

EC-Council Certified Security Analyst v8 (ECSA)

Certification Number: ECC34064171984

Issuer: EC-Council

Issued On: May 25, 2015

Key Skills: Design, secure, and test networks, interpret test results, and identify threats and vulnerabilities to protect organizational assets.
๐Ÿ”— Verify Credential

CHFI Logo

Computer Hacking Forensic Investigator v8 (CHFI)

Certification Number: ECC57502003565

Issuer: EC-Council

Issued On: February 27, 2015

Key Skills: Forensic investigation, evidence collection, incident reporting, cybercrime analysis, and auditing systems to prevent recurring attacks.
๐Ÿ”— Verify Credential

CEH Logo

Certified Ethical Hacker v6 (CEH)

Certification Number: ECC96154788108

Issuer: EC-Council

Issued On: July 13, 2009

Key Skills: Intrusion detection, policy creation, buffer overflows, virus development, DDoS simulation, and social engineering.
๐Ÿ”— Verify Credential

CISM Logo

Certified Information Security Managerยฎ (CISM)

Issued By: ISACA

Issued To: Haran Mamankaran

Date Issued: September 19, 2019

Key Skills: Risk management, security governance, incident response strategy, and alignment of cybersecurity with business objectives.
๐Ÿ”— Verify Credential

CDPSE Logo

Certified Data Privacy Solutions Engineerโ„ข (CDPSEโ„ข)

Issued By: ISACA

Date Issued: February 19, 2021

Key Skills: Privacy by design, data lifecycle management, governance alignment, and enterprise privacy operations.
๐Ÿ”— Verify Credential

CySA+ Logo

CompTIA Cybersecurity Analyst (CySA+)

Issued By: CompTIA

Date Issued: May 11, 2018

Key Skills: CySA+ validates proactive threat hunting, SIEM monitoring, and incident response skills through real-world analytical techniques and communication best practices.
๐Ÿ”— Verify Credential

CompTIA Cloud+ Logo

CompTIA Cloud+ ce Certification

Issued By: CompTIA

Date Issued: June 03, 2023

Key Skills: Cloud+ certifies professionals with the technical skills required to deploy, secure, and optimize cloud-based infrastructure services across diverse platforms to meet business and operational goals.
๐Ÿ”— Verify Credential

INE Logo

INE Junior Penetration Tester

Issued By: INE

Date Issued: May 21, 2022

Key Skills: This credential confirms foundational penetration testing skills including vulnerability discovery, basic exploitation techniques, and secure reporting โ€” ideal for early-stage ethical hackers.
๐Ÿ”— Verify Credential

eMAPT Logo

Mobile Application Penetration Tester (eMAPT)

Issued By: INE

Date Issued: August 28, 2022

Key Skills: The eMAPT certifies your ability to build and exploit real-world iOS and Android apps. It validates hands-on mobile assessment skills from coding POCs to bypassing protections.
๐Ÿ”— Verify Credential

eNDP Logo

Network Defense Professional (eNDP)

Issued By: INE

Date Issued: December 21, 2022

Key Skills: The eNDP certifies hands-on network defense skills such as vulnerability management, secure network design, endpoint hardening, and patch management. Ideal for defensive security roles.
๐Ÿ”— Verify Credential

eCPPT Logo

Certified Professional Penetration Tester (eCPPT)

Issued By: INE

Date Issued: July 6, 2025

Key Skills: The eCPPT certification validates real-world penetration testing ability through a hands-on exam requiring exploit development, pivoting, and post-exploitation โ€” followed by a professional-grade report reviewed manually.
๐Ÿ”— Verify Credential

Professional Experience

15+ years of hands-on cybersecurity experience across the Telecom, Healthcare, Finance, and Food transportation sectors.

Asscoiate Manager - Global Cyber Security Operations

Sysco Labs

๐Ÿ“ Colombo, Sri Lanka

๐Ÿ“… 2024 - Present

๐Ÿ‘ฅ Full-time

๐Ÿ“ˆ Responsibilities

  • Ensured comprehensive incident lifecycle management: identification, assessment, containment, mitigation, and monitoring
  • Worked cross-functionally with cybersecurity teams and business units to align detection and response efforts
  • Drove implementation of threat intelligence (IOCs, YARA rules, Sigma rules) to proactively detect and scope threats
  • Developed and enforced SOC standards and procedures for alert triage based on relevance, accuracy, and response timelines
  • Created and matured operational playbooks to standardize threat response processes
  • Operated autonomously in high-pressure scenarios to escalate incidents per policies and playbooks
  • Mentored and guided SOC Level II & III analysts, fostering skill growth and operational excellence
  • Led SOC teams during active incident response, serving as a key advisor and coordinator with executive leadership
  • Defined and reported SOC KPIs and operational metrics via dashboards and executive summaries

๐Ÿ› ๏ธ Technologies & Tools

Azure Sentinel Sentinel One Nessus Cortex Python PowerShell

Lead - Cyber Defence Engineer

Dialog Axiata PLC

๐Ÿ“ Colombo, Sri Lanka

๐Ÿ“… 2019 - 2024

๐Ÿ‘ฅ Full-time

๐Ÿ“ˆ Responsibilities

  • Evaluated and implemented use cases tailored to the organizationโ€™s cybersecurity landscape
  • Led and supervised a team of security engineers, overseeing day-to-day security operations and incident investigations
  • Developed comprehensive security strategies and managed security operations including team structure and assignments
  • Supported investigations involving data breaches, property loss, internal theft, and cybercrime incidents
  • Continuously researched market trends to stay current with the latest threats and security technologies
  • Recommended deployment or upgrade of security systems based on emerging threat intelligence
  • Conducted and documented annual risk analyses and assessments
  • Ensured strict implementation and enforcement of internal security policies
  • Supported compliance efforts through ISO/IEC 27001:2013, NIST, and other industry standard audits
  • Oversaw server and endpoint hardening, including timely patch management and system maintenance
  • Developed emergency response procedures to effectively handle and mitigate cybersecurity incidents
  • Analyzed and optimized IT service delivery processes by identifying risks and suggesting improvements
  • Planned and conducted regular Vulnerability Assessments & Penetration Tests (VAPT), providing expert mitigation strategies

๐Ÿ› ๏ธ Technologies & Tools

Metasploit Burp Suite Nmap Kali Linux OWASP ZAP Qualys

SOC Manager

Dialog Axiata PLC

๐Ÿ“ Colombo, Sri Lanka

๐Ÿ“… 2017 - 2019

๐Ÿ‘ฅ Full-time

๐Ÿ“ˆ Responsibilities

  • Led Security Information and Event Management (SIEM) content development and correlation rule tuning to enhance threat detection accuracy
  • Managed a team of security engineers, overseeing daily operations and leading investigations into security incidents and data breaches
  • Contributed to internal investigations involving data/property loss, theft, and suspected criminal activities
  • Delivered timely incident summaries and escalation reports to senior leadership and executive stakeholders
  • Recommended implementation of new security systems and upgrades to strengthen the organization's defensive posture
  • Conducted annual risk assessments and supported organization-wide security readiness initiatives
  • Ensured organization-wide adherence to internal security policies, standards, and best practices
  • Supported internal security audits and contributed to successful ISO/IEC 27001:2013 compliance efforts
  • Ensured timely patching and maintenance of critical systems and infrastructure
  • Maintained up-to-date IT asset inventory and assisted in tracking regulatory compliance across systems

๐Ÿ› ๏ธ Technologies & Tools

Microsoft Sentinel Azure Security Center Tenable Rapid7

Senior Security Operation Centre Analyst

Dialog Axiata PLC

๐Ÿ“ Colombo, Sri Lanka

๐Ÿ“… 2013 - 2017

๐Ÿ‘ฅ Full-time

๐Ÿ“ˆ Responsibilities

  • Installed, configured, and maintained enterprise-grade security solutions including:
  • Privileged User Management (PUM)
  • Mobile Device Management (MDM)
  • Terminal Services & Remote Access Solutions
  • Security Information & Event Management (SIEM) Tools
  • Next-Generation Endpoint Protection Systems
  • Enforced full compliance with all organizational security policies and procedures
  • Assisted with periodic internal audits and security control assessments
  • Monitored and ensured proper endpoint protection across all user workstations
  • Performed daily operational security tasks including log reviews and access checks
  • Provided support in the installation and configuration of hardware and software for internal users

๐Ÿ› ๏ธ Technologies & Tools

Microsoft Sentinel Azure Security Center Tenable Rapid7

Enterprise Information Security Officer

Dialog Axiata PLC

๐Ÿ“ Colombo, Sri Lanka

๐Ÿ“… 2010 - 2013

๐Ÿ‘ฅ Full-time

๐Ÿ“ˆ Responsibilities

  • Ensured full implementation and enforcement of organizational security policies
  • Assisted with periodic internal security audits and compliance checks
  • Supported ISO/IEC 27001:2013 audit readiness and remediation activities
  • Maintained endpoint protection across all user systems and workstations
  • Executed daily security operations, including access control and log monitoring
  • Assisted in the installation and configuration of end-user hardware and software systems

๐Ÿ› ๏ธ Technologies & Tools

Arcsight Symentec Antivirus Tenable Rapid7

Career Highlights

15+
Years Experience
500+
Incidents Resolved
100+
Security Assessments

Technical Skills & Expertise

Comprehensive cybersecurity skill set covering offensive security, defensive operations, and strategic security management with hands-on experience across multiple domains.

Penetration Testing

Proficiency 95%
Web App Testing Network PenTest Wireless Security +3 more

Threat Intelligence

Proficiency 92%
Threat Hunting Malware Analysis Digital Forensics +3 more

Security Tools

Proficiency 90%
Logrhutham CrowdStrike Metasploit +5 more

Cloud Security

Proficiency 88%
AWS Security Azure Security Container Security +3 more

Skill Metrics & Experience

15+
Years Experience
50+
Security Tools Mastered
150+
Students Trained
100+
Security Assessments

Awards & Recognition

Industry recognition for excellence in cybersecurity, leadership, and innovative contributions to the field.

๐Ÿ“… 2020

Axiata Champion

Axiata Group Berhad

Recognized for 0.5% outstanding employee performance across the Axiata Group of Companines.

๐Ÿ“… 2020

Service From Heart Award - 2019

Dialog Axiata PLC

๐Ÿ“… 2018

Service From Heart Award - 2017

Dialog Axiata PLC

๐Ÿ“… 2018

Gold Award - IT Project Of The Year 2017

Dialog Axiata PLC

๐Ÿ“… 2018

Gold Award - Project Of The Year 2017

Dialog Axiata PLC

๐Ÿ“… 2018

Silver Award - Engineering Project Of The Year 2017

Dialog Axiata PLC

๐Ÿ“… 2017

Gold Award - IT Project Of The Year 2016

Dialog Axiata PLC

๐Ÿ“… 2017

Silver Award - Project Excellence initiative Of The Year 2016

Dialog Axiata PLC

๐Ÿ“… 2016

Bronze Award - Strategic Support Initiative Of The Year 2015

Dialog Axiata PLC

Key Achievements

50+
Critical Vulnerabilities Discovered
High-impact security flaws identified across various platforms
$1M+
Potential Losses Prevented
Financial impact avoided through proactive security measures

Community Involvement

  • Organazier of BSides Sri Lanka conferences
  • Mentor for Juniors in Cybersecurity
  • Contributor to open-source security tools
  • Conductiong Webinar and Workshops

Publications & Research

  • "Efficient Post-Processing of Intrusion Detection Alerts Using Data Mining and Clustering" - University of Ruhuna