Abdullah A. Email and Phone Number
Abdullah is a Consultant in the field of Technology Consulting & Cyber Security.He has more than 5+ years of experience working on offensive and defensive cyberteams, from conducting penetration testing for web applications, web servers, mobile applications, and APIs to setting up a SOC/SIEM center from scratch, analyzing logs, setting up alerts, monitoring systems, creating reports based on that data, and maintaining.He has a strong interest in ethical hacking, penetration testing, vulnerability analysis, SIEM/SOC, network and cloud security (Azure, AWS, GCP). Hard-working, energetic, personable, and technical-minded individual. Possess exceptional customer service and communication skills with the strong ability to multitask and resolve issues quickly. Currently in a cybersecurity role where I continue to develop and learn new abilities while contributing to the overall success of the organization. I also possess:● Experience in scripting languages including JavaScript, Python and Bash.● Excellent task management. Ability to handle multiple projects simultaneously.● Experience with security toolkits such as Kali Linux, Nessus and Burp Suite Pro.● Proficient in translating information from technical to executive/management terminology.He holds a Bachelor's degree in Computer Science with a focus on IT Security and Software Technology and is Microsoft certified for (AZ-900 | SC-900 | SC-200 | SC-100) as well as BSI Certified IT-Grundschutz Practitioner.
-
Cyber Security ConsultantEy Nov 2021 - Present● Engage in a variety of offensive penetration testing assessments including system/network (internal and external), web application, red and purple team, physical, social engineering, including the development and execution of phishing campaigns.● Hands on experience in penetration testing of Windows and Linux environments, Active Directory, network monitoring, TCP/IP networks, and vulnerability and threat management tools (including network based scanners).● Hands on experience in MITRE ATT&CK framework/detailed knowledge of global cyber threats, threat actors, and the tactics, techniques, and procedures (TTP’s) used by cyber adversaries, specifically those targeting the financial services sector.● Establish and implement hardening security concepts and techniques for Unix/Windows/Linux. ● Coordinating and conducting multiple cloud security audits and identifying, reviewing, prioritizing vulnerabilities and remediation measures based on Azure Security Benchmark and NIST standards.● Supporting- in SOC/SIEM vendor selection processes and in the creation of strategic concepts for SOC/SIEM operating models.● Perform external, internal, physical, web, SOC, and malware assessments including evaluation and derivation of measures to improve detection capabilities.● Collaborate with other IT-Security teams to implement security best practices and interact with clients on high and technical levels to discuss findings and resolutions.● Performed Triage, Incident response, Vulnerability management, Threat intelligence and Cyber threat intelligence analysis.● Monitored, identified, investigated, and responded to threats in multi-cloud environments using tools Microsoft Sentinel, Microsoft Defender for the cloud, Microsoft 365 Defender and Third-party security solutions.● Worked closely with business stakeholders, architects, identity administrators, Azure administrators, and endpoint administrators to secure IT systems for the enterprise. -
Security Engineer & Security AnalystKisters Ag Nov 2020 - Oct 2021● Design, development, and evaluation of an open-source IDS, IPS and SIEM in an industrial environment and execution of various tests for multiple clients, ensuring seamless integration with existing security infrastructure.● Monitoring and analyzing security events to identify potential threats and breaches.● Investigating and triaging security incidents to determine their severity and impact.● Manage and update intrusion detection rules to detect and respond to specific types of suspicious activities.● Developing and maintaining security incident response processes to effectively respond to security incidents.● Developing and maintaining security policies, procedures, and standards to ensure compliance with industry regulations and best practices.● Adjust and fine-tune the IDS, IPS and SIEM configuration to reduce false positives and improve detection accuracy.● Ensure that the IDS, IPS and SIEM aligns with organizational policies and compliance requirements for security monitoring.● Collaborating with cross-functional teams to implement security controls and measures to mitigate risks proactively.● Optimizing security tools and technologies to improve the effectiveness and efficiency of the security operations.● Creating and presenting regular reports and analytics to stakeholders to communicate security posture, incidents, and risks.● Providing security awareness training to employees to enhance their security awareness and practices.● Participating in continuous learning and professional development to stay current with emerging trends and techniques in the security field. -
Information Technology Security AnalystKisters Ag May 2020 - Oct 2020● Lead and conduct penetration testing in industry environments to identify potential system/network vulnerabilities and apply appropriate patches across the organization to comply with NIST and ISO 2700x standards.● Preparation and implementation of a company-wide simulated phishing campaign with evaluation and documentation of the results.● Conduct and manage regular vulnerability scans across the organization's systems, including both internal and external networks to identify security weaknesses, misconfigurations, and potential threats.● Review and analyze scan results to prioritize vulnerabilities based on severity and potential impact on the organization.● Collaborate and work closely with IT teams to apply necessary patches and updates to address identified vulnerabilities.● Generate and deliver detailed reports to stakeholders, including IT administrators and security teams, outlining identified vulnerabilities and recommended actions.● Perform compliance scans to ensure systems meet specific security standards and regulatory requirements.● Incorporate threat intelligence data to enhance vulnerability assessment and identify emerging risks.
Abdullah A. Education Details
-
Aachen University Of Applied Sciences - Fh AachenComputer Science -
Technical And Mathematical Science -
Ministry Of Education, Kingdom Of Saudi ArabiaExcellent
Frequently Asked Questions about Abdullah A.
What company does Abdullah A. work for?
Abdullah A. works for Ey
What is Abdullah A.'s role at the current company?
Abdullah A.'s current role is Cyber Security Consultant | IT Security Engineer | Cyber Security Threats Intelligence Analyst | Cloud Security Engineer | Microsoft Certified (SC-100 | SC-200 | SC-900 | AZ-900).
What schools did Abdullah A. attend?
Abdullah A. attended Aachen University Of Applied Sciences - Fh Aachen, Ruhr-Universität Bochum, Ministry Of Education, Kingdom Of Saudi Arabia.
Who are Abdullah A.'s colleagues?
Abdullah A.'s colleagues are Kon Samartzis, David Pistulka, Jovena Lim, Sumeet Yekhande, Thetoy Chen, Naman Gupta, Douglas Macleod.
Not the Abdullah A. you were looking for?
-
Abdullah A.
Trust & Safety @Tiktok | Prev @Twitch / Amazon | Trust & Safety | Finance | Cx | QaHouston, Tx -
Abdullah Abdulkarim
Washington, Dc2flatiron.com, signalhill.com -
-
Abdullah A
Orlando, Fl
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial