Fawad A Email and Phone Number
Fawad A work email
- Valid
- Valid
Fawad A personal email
• 8+ years of hands on experiences with Dark Web search techniques (Tails, TOR, Kali) and with incident response team. Deep analysis including an internal and external IP search reported to an appropriate team. • Well knowledgeable of various cyber laws such as HIPAA, HITECH Act, GLBA and many more. • Well trained in implementing national security counter cyber-terrorism, criminals and hackers threat analysis techniques. • Currently working with the following: IDS/IPS, DLP, monitoring an internal network for an authorized device, analyzing Spam/Phishing email, PDF as an attachment, with commercially available tools to ensure safety and security within the organization. • Understanding the Confidentiality, Integrity and Availability (C.I.A) triad of the business to bring value to the organization by using the security policies, procedures and guidelines. • Anti-Hacker, steganography, Hidden Keyloggers, Trojans, etc. and identifying 'Internet of Things' vulnerabilities. • Comfortable working with UNIX/Linux distributions and using shell scripting on Kali Linux for computer forensics and examining malware and networking packets for unsecured network data flow. Also using a Santoku Linux for mobile forensics tools to acquire and analyze data. • Comfortable working with Window Server, Active Directory Configuration, MS Exchange Servers and SCCM checkup. • Highly self-motivated, using available resources for self-improvement and development. • Flexible: able to follow directives and accomplish tasks outside of normal duties. • File Encryption and Signatures (GPG4WIN) Password HASH Extraction with FGDUMP• Knows TCP/IP, WAN, LAN, Physical, Data Link Layer Network Concepts and Firewalls, Tunnels and Network Detection.• Able to explain highly security and complex information to peers, management and customers through either a verbal or written medium.** I have been a Guest Speaker at Harvard University Graduate Class 2021 - speech topic was 6 threat vectors in Cybersecurity - reference or recommendation from Harvard are available only by request.
-
It Security Analyst In Security Compliance Standards At Agero, IncAgero, Inc.Newton, Ma, Us -
Cybersecurity EngineerBoston Medical Center (Bmc) Oct 2024 - PresentBoston, Ma, Us -
Information Security AnalystBoston Medical Center (Bmc) May 2018 - Oct 2024Boston, Ma, Us• BMC HealthNet Plan• Health System -
Information Security SpecialistFirst Republic Bank Apr 2017 - May 2018San Francisco, Ca, Us -
Information Security AnalystAgero, Inc. Aug 2015 - Apr 2017Medford, Massachusetts, Us• Monitored a compliance with Agero’s policies and applicable laws such as GLBA, HIPAA and many others. • Used Splunk, a SIEM tool, on a daily basis for unexpected computer lockout, VPN logs, eDiscovery purpose and as well for security, other deep analysis and system activities monitoring.• Qualys, Tripwire, IronPort, Websense, Varonis, MacAfee IDS/IPS, Cisco Meraki MDM, and WLC applications of specific security skills to monitor, maintain, and control the suite of tools used by the Information Security Team. • Provided required metrics on a daily, weekly and monthly basis including actuals versus goals, trends and threshold violations. • Used a penetration and vulnerability analysis of various products, applications and provided an output documentation including a technical analysis and a very high-level non-technical overview. • Worked together with the IT management, the Legal department, safety facilities & security, the 3rd party and Law Enforcement agencies to manage security vulnerabilities.• Tasked with ensuring PCI DSS compliance among all North America sites. -
National Security Aeronautical Espionage And Cyber Security Analyst InternshipNational Security & Investigation Agency Jun 2016 - Aug 2016• Introduction to aeronautical, satellite and 'Internet of Things' vulnerabilities. • Learned and utilized dark web research techniques. • Learned and implemented national security cyber-terrorism, criminals and hackers threat analysis techniques. • Learned and utilized lone wolf predictive analysis. • Learned and understood the role of digital currencies for trafficking, terrorism and arms sales by nation-state actors. • Learned and utilized technologies to analyze cyber fraud. • Learned and understood the role of hacktivists/activists/nation-state hackers as proxies for war.
-
Technical Support SpecialistSynchro Software Ltd. Mar 2014 - Jul 2015Exton, Pennsylvania, Us• Provided a direct technical assistance to customers via phone, email and Remote Assistance. • Effectively communicated procedural and technical issues to internal and external customers in a fast-paced and customer-critical environment. • Determined which tools to use in order to resolve issues, including running tests and identifying when deviation from the available troubleshooting tools and documents is appropriate. • Daily integrated APIs from Oracle, AutoCAD and Revit applications to allow them communicating with Synchro software. • Used Amazon Web Server (AWS) for a cloud computing platform that offered unlimited shared licenses to our users. • Used Jira for ticketing system, Flexera for licensing purpose and HubSpot CRM tool for customers purpose. -
Advanced Repair & Technical AgentGeek Squad 2012 - Apr 2014UsReponsibilities• Maintain, repair, and service client devices & equipment • Maintain customer data in Support system to ensure it is accurate and up to date • Install and configure PCs and Mac software and peripherals. • Communicates effectively and professionally with peers, supervisors, ancillary departments and all other external/internal customers. • Provide timely, helpful responses and troubleshooting assistance for PCs and Mac by phone, e-mail and in Geek Squad store.• Record problem and resolution details in Geek Squad ticketing system Nova.• Helping to raise their daily revenue
Fawad A Skills
Fawad A Education Details
-
Boston UniversityInformation System Security -
Capitol Technology UniversityHealthcare Cybersecurity -
Southern New Hampshire UniversityInformation Technologies - Cybersecurity -
Massachusetts Institute Of TechnologyCyber Security -
Harvard UniversityScience 9 Program -
Boston Community Leadership AcademyGeneral Studies
Frequently Asked Questions about Fawad A
What company does Fawad A work for?
Fawad A works for Agero, Inc.
What is Fawad A's role at the current company?
Fawad A's current role is IT Security Analyst in Security Compliance Standards at Agero, Inc.
What is Fawad A's email address?
Fawad A's email address is fa****@****bmc.org
What schools did Fawad A attend?
Fawad A attended Boston University, Capitol Technology University, Southern New Hampshire University, Massachusetts Institute Of Technology, Harvard University, Boston Community Leadership Academy.
What are some of Fawad A's interests?
Fawad A has interest in Network Operations Center (Noc), Cyber Security, Networking Security, Big Data, Forensic, Linux.
What skills is Fawad A known for?
Fawad A has skills like Ulead Videostudio, Microsoft Operating Systems, Mac Os, Computer Forensics, Information Security, Powerpoint, Linux, Employee Engagement, Personal Data Protection, Adobe Acrobat, Active Directory, Microsoft Operating.
Who are Fawad A's colleagues?
Fawad A's colleagues are Andrew Bell, Kayla Badillo, Courtney Greene, Morgan Logan, Jose Antonio Sesin, Graciela Castellano, Melanie Guzman.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial