Image of Darshil Shah

Darshil Shah's Email & Phone Number

Information Security || Product & Application Security || Security Engineering || Compliance || Risk Management || Governance || Strategy and Planning

Darshil Shah's Email Addresses

da****[email protected] Personal Email

Darshil Shah's Phone Numbers

+44 ** **** *972 Phone number

Darshil Shah's Work Experience

Goldman Sachs

Vice President, Information Security Manager

January 2022 to Present

Goldman Sachs

Vice President, Information Security

January 2022 to Present

Oportun

Staff Security Engineer

March 2021 to December 2021

Show more

Darshil Shah's Education

Baroda High School (Alkapuri)

January 1995 to January 2010

Gujarat Technological University

Darshil Shah's Professional Skills Radar Chart

Based on our findings, Darshil Shah is ...

Troubleshooter
Resourceful
Questioning

What's on Darshil Shah's mind?

Based on our findings, Darshil Shah is ...

52% Left Brained
48% Right Brained

Darshil Shah's Estimated Salary Range

About Darshil Shah's Current Company

Goldman Sachs

Frequently Asked Questions about Darshil Shah

What company does Darshil Shah work for?

Darshil Shah works for Goldman Sachs


What is Darshil Shah's role at Goldman Sachs?

Darshil Shah is Vice President, Information Security Manager


What is Darshil Shah's personal email address?

Darshil Shah's personal email address is da****[email protected]


What is Darshil Shah's business email address?

Darshil Shah's business email address is [email protected]***.***


What is Darshil Shah's Phone Number?

Darshil Shah's phone +44 ** **** *972


What industry does Darshil Shah work in?

Darshil Shah works in the Information Technology & Services industry.


About Darshil Shah

💼 Past Experience

In Information Security, Darshil Shah is responsible for developing and implementing security risks assessment tools and techniques for Bracketed Security Assessment (BSA) tool tool Set and Data Science Assessment Algorithm (DSA).In Application Security, he is currently responsible for developing and implementing best practices for data frames, user authentication, and data obscured values. Additionally, he is also responsible for conducting study on how to mitigating risk in cross-site scripting (XSS) attack and designing attack scripts.In Product Management, he is currently responsible for developing and implementing product management strategy, oversight and decision-makers; monitoring application security; and maintaining quality assurance records for products.He is also responsible for developing and implementing product security and governance documents. Lastly, he is also responsible for quality assurance for product prototypes.


🎓 Education

Darshil Shah is a born and raised Indian classical musician and software engineer. He got his education from BJP Vs University Department of Computer Science and Engineering, Gujarat Technological University in 2010. Shah then studied at Baroda High School (Alkapuri) from 1995 to 2010. He completed his undergraduate studies with a Bachelor of Engineering (B.E.) in Computer Science Engineering from the Gujarat Technological University in 2014. Shah is currently working as a software engineer at a Gurgaon-based tech company. Shah is interested in music and has played the violin since he was a child.


💡 Technical & Interpersonal Skills

Information Security:Darshil Shah is a senior information security engineer at Capital One from January 2015 to March 2016 (1 year 3 months) in Plano, Texas. He has experience in information security through his work at Capital One and previous positions at CHEEZY TECHNOLOGIES and PepsiCo.In his previous positions, Darshil Shah has expertise inaudit and security testing, application security, product management, risk management, and governance. He is also a good team builder and has experience working in a distributed environment.Information security is a key part of Capital One's strategy and work emphasis. To ensure their customers' safety, the company creates a comprehensive security plan and hikes staffing intensity in anticipation of high-risk attacks. Application Security:Applied security is another key focus for Capital One. To address the cybersecurity challenges faced by their customers, the company has created a secure application center and created a product management process for their products. They also have a secure email system and require employees to undergo security training.In addition, Capital One has a dedicated team of application security experts who work with product managers to ensure the quality and accuracy of their products. Product Management:Product management is another key focus for Capital One. To stay ahead of the curve in terms of product security, the company has a comprehensive product management process. They require employees to undergo security training and develop a product feedback plan. Additionally, they have a secure email system and require employees to undergo security training.The product management process ensures that all products are meeting the company's security standards. Additionally, they have a risk management process in place to manage the risks associated with their products.Product Security:In order to ensure the safety of their customers' data, Capital One has a security strategy in place. They have a secure application center and create a secure email system. They also have a security plan in place requiring employees to receive security training.Additionally, Capital One has a risk management process in place to manage the risks associated with their products. This process Includes a review of their security strategy each quarter and the presentation of these findings to the team.Strategy and Planning: RSA Security is a top security software company. Capital One has worked with RSA Security to develop a strategy and planning process for their information security needs. This process includes the identification of their biggest information security risks, the development of security plan, the implementation of the security plan, and the monitoring of the security plan.Risk management is another key focus for Capital One. They have a risk management process in place to manage the risks associated with their products. This process includes the review of their security strategy each quarter and the presentation of these findings to the team.Organizational Strategy and Planning:Lastly, organizational strategy and planning is another key focus for Capital One. To stay ahead of the curve in terms of their industry, the company has developed a strategy and planning process. This process includes the identification of their industry-leading practices, the development of a plan for doing these practices, the implementation of the plan, and the


Darshil Shah’s Personal Email Address, Business Email, and Phone Number

are curated by ContactOut on this page.

10x your recruitment & sales conversations

Contact over 250M professionals instantly by email or phone. Reveal personal & work email addresses, as well as phone numbers accurately with our ContactOut Chrome extension.
Sign up for free

In a nutshell

Darshil Shah's Personality Type

Introversion (I), Sensing (S), Thinking (T), Perceiving (P)

Average Tenure

2 year(s), 0 month(s)

Darshil Shah's Willingness to Change Jobs

Unlikely

Likely

Open to opportunity?

There's 89% chance that Darshil Shah is seeking for new opportunities

Darshil Shah's Social Media Links

/in/darshil7shah
Engage candidates 10x faster

Enjoy unlimited access and discover candidates outside of LinkedIn

Trusted by 400K users from 76% of Fortune 500 companies

Microsoft Nestle PWC JP Morgan Merck Rackspace WarnerMedia Randstad Yelp Google

The most accurate data ever

CCPA Compliant
GDPA Aligned
150M Personal Emails
200M Work Emails
100M Direct Dials
250M Professional Profiles
30M Company Profiles

Find anyone, anywhere
with ContactOut today

Making remote or global hires? Connecting
with key decision-makers? We can help.

  • 40 emails / month
  • 3 phone numbers / month
  • Works on standard LinkedIn only
  • Work emails, personal emails,
    mobile numbers
* 1 user per company limit

No credit card required

Try ContactOut for Free