ZEESHAN HAIDER Cyber System Security Engineer Network Information 971 58 20 35 980 linkedin.com/in/zeeshan2022 [email protected] United Arab Emirates Professional Summary Innovative tech mind with 7 years of experience in IT Industry. A Certified Ethical Hacker from EC Council. Profound knowledge of Network Security, Penetration Testing, IT, OT and Cyber Security. Extensive expertise in network architecture design and implementation along with IT infrastructure Design, implementation & administration. Work Experience Information Security Officer ISO at AL ZAIN OASIS Technology DUBAI, UAE May20220 – present Develop, implement and monitor a strategic, comprehensive enterprise information security and IT risk management program Work directly with the business units to facilitate risk assessment and risk management processes Develop and enhance an information security management framework Understand and interact with related disciplines through committees to ensure the consistent application of policies and standards across all technology projects, systems and services Provide leadership to the enterprise's information security organization Partner with business stakeholders across the company to raise awareness of risk management concerns Assist with the overall business technology planning, providing a current knowledge and future vision of technology and systems Chief Information Security Officer CISO at Electritech Technology Regus Business Centre, Expo Centre Sharjah, UAE Sep 2019 – May-20 Taking necessary preventive action to ensure chronic info-security threats were not repeated. Investigating, diagnosing and solving computer software and hardware faults. Ensured risk reduction through information security policy development. Designed network intrusion detection system and implemented supporting backup programs Help analyze findings in investigative matters, and develop fact-based technical reports detailing events over specified periods of time. Use Service Now as a incident management. Demonstrated proficiency with Active Directory, SSL, DNS, etc Provide expert level technical support for unresolved Support Desk tickets. Education 2020 Master of Science in Cyber Security MS COMSATS Islamabad Pakistan 2016 Bachelor of Science in Telecommunication and Networking BS COMSATS Islamabad Pakistan Skills Designing and implementing both the physical and wireless networks, for computer communications and telecommunication. Monitoring and maintaining computer infrastructure, particularly emphasizing: On-site servers Interactions between the software and the Network integrity and resilience. Computer security log capture tools, log analysis methods, time clock synchronization and event correlation. Network Forensics Penetration Testing SOC/NOC VMware /Hyper-V Firewalls (Fortinet ...) SIEM Management Linux, Windows Servers Encryption Tools Programing Languages Python / C# / PHP Perl Kali Linux Firewall/IDS/IPS Certification’s/Courses: CEH (ECC9106437582), CHFI, CCNA, CCNP, MCSA, Security+, Hardware+ Enterprise Application Software’s VMware VSphere (ESXi 5.5 client, vCenter servers, SAN / NAS storage management Cisco ASA (5520, 5515, 5505) , Cisco NX-OS Fortinet , Palo Alto PA-3060, Juniper Networks EX42xx , Cisco ACI 5510 , mikrotik etc Nagios XI, Netwitness , Wire shark, Paessler PRTG Network Monitor, Snort, NMap Netsparker, Aircrack, OpenVAS, Nikto, Metasploit Framework, John The Ripper, Sqlmap, BeEF, OSWAP CAFM (Harmony PSA, FSI), Logarithm, ServiceNow, SolarWinds, MacAfee Why Zeeshan? Qualified and proficient information officer and systems & security engineer having expertise in maintenance of computer networks, hardware, software and other related systems. Result-oriented professional holds sound comprehension of analytically performing disaster recovery operations, protecting data, software and hardware from attacks; skilled at multitasking between handling documentations & daily jobs Diligent individual has detailed understanding of application transport and network infrastructure protocols as well as ability to maintain good coordination and collaboration with different departments and teams involved in on-going projects Soft Skills An analytical mind An ability to learn new technologies quickly Good time management skills An ability to follow processes Strong documentation skills Good communication skills – both written and verbal Commercial and business awareness Professional Experience Chief Information Security Officer CISO at Electritech Technology Regus Business Centre, Expo Centre Sharjah, UAE Sep 2019 –MAY-20 Security operations: Real-time analysis of immediate threats, and triage when something goes wrong Cyber risk and cyber intelligence: Keeping abreast of developing security threats, and helping the board understand potential security problems that might arise from acquisitions or other big business moves Data loss and fraud prevention: Making sure internal staff doesn't misuse or steal data Security architecture: Planning, buying, and rolling out security hardware and software, and making sure IT and network infrastructure is designed with best security practices in mind Identity and access management: Ensuring that only authorized people have access to restricted data and systems Investigations and forensics: Determining what went wrong in a breach, dealing with those responsible if they're internal, and planning to avoid repeats of the same crisis Governance: Making sure all of the above initiatives run smoothly and get the funding they need and that corporate leadership understands their importance The ability to work with data scientists to detect and respond to threats The ability to oversee pen testing to find vulnerabilities in all elements of a security system Data and information management, including classification, retention and destruction. It also means keeping corporate and personal data both private and secure while needed, and destroyed when it is no longer needed. Digital forensics, which means finding out what allowed an intrusion to occur so it can be prevented in the future. IT Systems Administrator CUI Islamabad (2012-2019) Taking necessary preventive action to ensure chronic info-security threats were not repeated. Updating all departments on potential new cyber threats. Conducting evaluation of intranets and firewalls on a regular basis. Provided technical and vendor support services, designing and planning Network Planning, Implementing, Configuring, SRX210, SRX240 Ex4200 EX4300, QFX5100 Troubleshooting and Testing of networking system Evaluated network performance and activities on layer 3 routing and layer 2 switching. Coordinated with internal technical groups for delivery of telecommunication services and network infrastructure Managed routers, switches, and firewall as part of day to day operations Assisted in effective operation and maintenance of enterprise based network solutions and applications Implemented procedures for configuration and management of routers and switches and firewalls Confidential local and remote sites Upgraded network equipment, software and hardware components and system configuration Maintained technical detailed documentation of LAN and WAN systems and applications. Accomplishments: Ensured risk reduction through information security policy development. Employed various technical methods to safeguard customer data. Designed network intrusion detection system and implemented supporting backup programs Develops and implements test and acceptance criteria for network elements. Integrated Confidential Contact Center express with Confidential Unified Communications Manager. Executed several implementations of Confidential Call Manager Express and Unity Express. Configured application security for AS400 platform Execute production testing and provide support for Load Lab test cases Solved/Engineered call routing, number translation, pickup groups, and call handler issues. Oversaw migration of WAN links to new service provider, assisted with the design of full mesh WAN, set up TFTP server to backup, Confidential routers, and Catalyst switches. Support Confidential CCM Unity day to day support. Provide support for entire campus connected to the Main, IVRs, and call recordings. Global IT Vendors Microsoft Symantec VMware Cisco Teradata Cisco Huawei Juniper Fortinet OWL SoC EY ,Si MPLS-TP Skills & Knowledge (Servers, System, Security & Networking) Network security with Snort, IDS, IPS, MOD SECURITY. Network Analysis Tools (e.g. Netwitness, Wireshark, etc.) System Analysis, Forensic Tools and Endpoint Security Forward Proxy / Reverse Proxy Security Standards: CCM, NIST CSF, ITIL, PCI-DSS , SIEM tools IDS/IPS, ISO27001 & GDPR CCTV Management – Installation, configuration and complete operation including backup Strong understanding of cloud (SAAS/IAAS) security requirements Strong knowledge on OWASP VMWARE ESXi 5.0/6.5, Microsoft Hyper-V Administering & designing LANs, WANs internet/intranet DMZ and NAT-PAT & VoIP networks (PSTN, PBAX) VLAN, QoS, Active Directory, DNS / DHCP / LDAP / NFS Cisco Router, Cisco Switch, Switching (L2/L3), Network management Routers Firewalls Remote Access RDP, team viewer VNC, Telnet/SSH, HP ILO, iDRAC, PRTG & DELL KACE IP & IP Addressing, ACLS, TCP/IP ARP, ICMP, TCP, UDP, FTP, TFTP, MRTG, MRTG2 Nagios . Network & security infrastructure including Cisco ASA (5520, 5515, 5505) adaptive security appliance, Cisco wireless controller, routers/switches & voice gateway & NTP server as per ITIL standards and company’s policies OS: Any OS & NOS (Servers) including CentOS, Ubuntu , RedHat Languages: All most All Languages including C#, PHP, JavaScript, Python, R etc. Databases: SQL, MS-SQL, HBase etc. Layer 3: IP, IPSec, BGP, GRP/EIGRP, OSPF, RIP, NAT, HSRP, MPLS, Confidential, TACACS, LDAP NTP, RADIUS, DNS, DHCP Voice over IP: Call Manager, Unity, Avaya, PBX Trunking, Active Directory Integration, Call Detail Recording, Automated Attendant, Extension, Mobility. Infoblox and DNS and F5, LAN & WAN troubleshooting, Call Manager & Unity, VoIP, VPN. IT Voice over IP, Solar Winds Some Configuration of Confidential Nexus, Confidential ASA firewalls, Catalyst 3750, 2900, 2811, 3960. Juniper SRX210, SRX240 Ex4200 EX4300, QFX5100, MPLS, OSPF, IGRP, EIGRP, HSRP, TCP/IP, Operation: Switches, Layer 2 switching - VLAN, Port channel, virtual Port Channel Cyber Forensics & Security Skills Computer Forensics Investigation Process Along with Searching and Seizing Computers to obtain Digital Evidence as a First Responder. Recovery of deleted files and partitions in popular computing environments, including Windows, Linux, and Mac OS Utilizing Access Data Forensic Toolkit (FTK), The Sleuth Kit, Autopsy , Hexview ,EnCase Steganography, Steganalysis, and Image File Forensics etc Password cracking concepts, types of PW attacks, latest tools and technologies to decipher password breaches Computer security log capture tools, log analysis methods, time clock synchronization and event correlation Educational Qualifications MS in Cyber Security (CUI ATD) CGPA 3.38 2017- - Majors Advanced Cryptography , Digital Forensics , Network and Systems Security Digital Content Analysis, Ethical Hacking, Security in Cloud Environment. MS Research / Project Skills Topic: Automatic Analysis of Malware using Machine Learning. Expert in Writing Code, Scrubbing Data, Visuals for Presentations in Python and R Language. BS in Telecommunication and Networking (COMSATS ATD) CGPA ≈ 3 2012- 2016 Majors Telecommunication Network Management , Mobile Communication , Network Security Telecommunication Network Design, Wireless Networks, Network Operating System. DAE (Electrical) 1st Division 2011 Majors Computer Application Application of Computer in Electrical Technology Telecommunication SSC (Science) 1st Division 2008 Personal Information Date of birth : Oct 1991. Gender : Male. Marital Status : Married. Nationality : Pakistani. Driving License : Yes Address : Warda 2 Apartments by Nshama Town Square Dubai Languages known : English, Urdu & Arabic (Basic) Declaration I hereby declare that the above furnished details are true to the best of my knowledge Sincerely, Zeeshan Haider ____________________
Enter the password to open this PDF file:
-
-
-
-
-
-
-
-
-
-
-
-