Narayanan Gunasegaran
About Narayanan Gunasegaran
Narayanan Gunasegaran is an Identity & Access Management Manager at Deriv, where he has built and expanded the IAM team and developed access management processes for over 300 systems. He has a background in internal auditing and risk advisory, with experience at various organizations in Malaysia.
Work at Deriv
Narayanan Gunasegaran has been serving as the Identity & Access Management Manager at Deriv since 2022. In this role, he established the Identity & Access Management (IAM) team from the ground up, successfully expanding it to eight members within six months. His responsibilities include collaborating with the IT Admin team to streamline access provisioning using Okta. He has developed processes and policies for managing access to over 300 systems, ensuring adherence to IAM best practices and frameworks.
Previous Roles at Deriv
Before his current position, Narayanan held multiple roles at Deriv. He worked as an Internal Audit Manager from 2020 to 2022 and as a Senior Internal Auditor from 2016 to 2019. In these positions, he contributed to the company's audit processes and risk management strategies while based in Cyberjaya, Selangor, Malaysia.
Education and Expertise
Narayanan studied at Curtin University Malaysia, where he earned a Bachelor's degree in Accounting and Finance from 2008 to 2012. His educational background provides a solid foundation for his expertise in identity and access management, internal auditing, and risk advisory.
Career Background
Narayanan's career includes experience in various roles prior to joining Deriv. He worked as an Accounts Payable & Receivables Assistant at Hitachi Data Systems for seven months in 2012-2013. He also served as an Internal Audit Officer at Lefis Consulting Sdn Bhd for one year and as a Senior Associate 2 in Risk Advisory at Crowe Malaysia from 2014 to 2016.
Achievements in Identity and Access Management
In his current role, Narayanan has implemented quarterly system access review plans to enhance transparency and structure based on system criticality. He spearheaded the creation of the Role Based Access Control Matrix and the Birth Right Access Control Matrix. Additionally, he developed and ensured compliance with the PII Data Sharing Procedure for the Group.