Jawed Ahmad work email
- Valid
- Valid
Jawed Ahmad personal email
- Valid
- Valid
At Stratejm Inc., strategic innovation and cybersecurity are at the core of our mission, with over two decades of experience in technology leadership roles fueling our commitment to excellence. Our team's efforts in integrating cutting-edge solutions such as SOAR into our CyberMesh architecture have significantly optimized our time to containment metrics.With a distinct focus on automation, we are pioneering the next generation of security services, ensuring advanced incident responses and robust cloud services. The team at Stratejm tirelessly pursues the latest industry trends, empowering our clients to navigate the complexities of the digital landscape securely and efficiently.
-
Chief Technology OfficerBell CyberMississauga, On, Ca -
Chief Technology OfficerStratejm Inc. Oct 2022 - PresentMississauga, Ontario, Ca -
Director Of Operations And Engineering ServicesStratejm Inc. Mar 2016 - Oct 2022Mississauga, Ontario, Ca -
Security ConsultantCybertual Systems Inc. Jul 2013 - Sep 2021- McAfee Data Loss Prevention - McAfee Drive Encryption- McAfee File and Removable Media Protection- McAfee VirusScan Enterprise- Two Factor Authentication- McAfee ePO Implementation- Sonicwall Firewall implementation- Office 365 Migration- VA and Pentest using Backtrack\Kali\Qualys\NeXpose\Metasploit- Availability Monitoring via host SaaS platformCitrix XenApp and XenDesktopCloud Virtualization
-
Mcafee ConsultantJ.D. Irving, Limited Aug 2014 - Mar 2016Saint John, Nb, Ca -
Telecommunications Analyst - Netscaler ExpertRbc Apr 2014 - Aug 2014Toronto, Ontario, Ca• Configure, implement and maintain Citrix Netscaler in an HA at various international RBC sites.• Monitor and resolve Netscaler performance issues• Day-to-day support and maintenance activities of the network infrastructure pertaining to Citrix Netscaler.• Review designs, managing implementations and supporting emerging networksolutions to meet business requirements. • Directly involved in analysis of business needs to consult and make recommendations for new deployments and upgrades. • Lead day-day operational activities on the network and will lead and coordinates all move/add/change (MAC) activities. • Provide support and escalate as appropriate and acted as the lead on major and complex implementations.• Responsible for transferring knowledge to peers and the operations support teams.• Reviews all MoPs (method of procedures) associated with changes and deployments to ensure they are concise and accurate. -
Security ConsultantLoblaw Companies Limited Jul 2013 - Mar 2014Brampton, Ontario, Ca• Manage and ensure security threats/risk are identified and mitigated based on Loblaw’s risk appetite and accepted standards.• Work with internal security team and external consultants as appropriate for independent security audits and risk remediation.• Assist with creating and maintaining sound security documentation to ensure processes are documented and reviewed.• Ensure all critical systems are logging to SIEM (RSA enVision), correlated, and analyzed.• Provide consulting in security requirements to project team based on system business requirements and project scope.• Review and assess projects’ design documentations to ensure the requirements can be delivered. • Manage 3rd party security service provider to ensure timeliness, accuracy, responsiveness of the service that they should deliver• Manage Netscaler Application Firewall policies for several public websites• Manage RSA DLP solution and define/fine tune policies for PCI and PIPEDA related monitoring.• Manage AlgoSec, a Firewall optimization tool that is used to monitor 40+ firewalls in production.• Responsible for conducting vulnerability and policy compliance scan using Qualys and creating reports -
Manager, Security Operations CenterThe Herjavec Group May 2010 - Jul 2013Kansas City, Mo, Us• Define security policy framework as a guideline in responding to incidents that threaten information privacy or security• Implement Security Management Process to as to: Identify specific processes and tools to contain the incident/threat Outline methods of recovering compromised devices on the network Mitigate the potential damage from system breaches Provide security measures to prevent threats from harming the network in the future• Define security incident responsibilities to Report, Recover, Remediate and Prevent.• Demonstrate an understanding of key management concepts related to budgeting, delegation, motivation, task coordination and building/maintaining employee and client relationships within the context of Managed Security Services.• Responsible for the managed security technologies/platforms utilized by the SOC, overseeing installation, ensuring backup systems operate effectively, overseeing the technology infrastructures within Herjavec Group that affect the SOC and Managed Clients.• Assist in developing correlated rules to continuously enhance monitoring, alerting and reporting capabilities using SIEM technologies, Such as RSA enVision and QRadar.• Contribute to organisational policy regarding standards, strategic planning, and incident management.• Responsible for day-to-day management of the SOC, assesses performance, addresses performance management issues, and provide coaching, training and career development opportunities.• Evaluate Managed Client needs as they evolve and relevant system functionality - ensure that the SOC meets these needs.• Play a significant role in long-term planning, including an initiative geared toward operational excellence.• Assist in scheduling upgrades and security backups of managed hardware and software systems; • Ensure the stability, consistency and sustainability of all SOC -related systems, processes and procedures including policies around security incident management. -
Senior Systems EngineerCyberklix Jan 2010 - Jun 2010• Installation and Configuration of XenApp and publishing in-house applications as well as standard package.• Installation and Configuration of File Integrity Monitoring (FIM) Solution such as Tripwire• Install and Configure McAfee ePO with HIPS, AV and AntiSpam Module with MS SQL backend database server.• Installation and configuration of RSA SecurID 7.0, Synchronize with AD and integrate with SSL VPN for two factor authentication.• Installation and Configuration of BigFix Enterprise Solution with Endpoint Security, Software Asset Management module• Design and implement Active Directory and Integrate Windows 2008 within Windows 2003 AD environment.• Document and Implement Windows 2003/2008 Server Hardening • Implementation and maintenance of Redundant RSA SecurID for two factor authentication required for SSL and IPSec VPN• Provided customers with recommendations on adapting virtualization technology and implementing it.• Install and configure Sonicwall/Aventail SSL VPN with Active Directory and RSA SecurID integration.• Looking over day to day operations of Tier-II group and providing support to them as and when required
-
Systems AdministratorCyberklix Jul 2006 - Mar 2010• Internal infrastructure support for internal network devices and servers• Implementation of network topology design and infrastructure changes• Installation and configuration of RSA Envision and McAfee IPS Platform• Implementation and maintenance of Redundant RSA SecurID for two factor authentication required for SSL and IPSec VPN• Implementation of BigFix Enterprise Suite for patch management• Implementation of Blackberry Enterprise Server 4.x and 5.x for High Availability• Install, configure and maintenance of VMware ESX Server and Citrix XenServer• Install, configure and maintenance of application publishing using Citrix XenApp and desktop publishing using XenDesktop.• Provisioning Desktops using Citrix Provisioning Server• Install, Configure and Maintain “LiveTime” ticketing system for use internally by end-users and externally by clients published via SSL VPN• Investigate and resolve internal issues raised through Ticketing System• Assessment of RSA Envision implementations for clients, providing recommendations and coaching • Implementation of McAfee EPO 3.x/4.x with Host Intrusion Prevention System (HIPS), DLP, AV and AntiSpam Modules.• Install, configure and maintain Secure Computing Webwasher integrated with Microsoft Active Directory.• Responsible for initiating/ implementing virtualization technology in the company.
-
Systems AdministratorAiromix Systems Inc. Feb 2002 - Mar 2006• Built and reviewed detailed plans for upgrading the new Network structure with out disrupting the current users and without having any significant down time. • Upgraded and configured all servers to DELL Power Edge rack servers on Windows 2000 Advanced server moving to Windows 2003 Enterprise Edition in 2004. • Successfully implemented ISA Server for network security and installed GFI WebMonitor for monitoring the server activities.• Implemented Active Directory for centralized administration of internal and external users. • Implemented Exchange Server 2000 for the e-mail system and internal messaging system using MSN messenger.• Implemented Windows 2000 on Workstations and eventually upgrading to Windows XP professional/ Windows 2003 Standard Edition• Implemented remote access for external employees using dial-up and broadband VPN providing appropriate security and access rights.• Configured wireless network for mobile users implementing 128 bit security.• Performed In-house troubleshooting of hardware and operating system related issues• Extensively involved in manufacturing business processes, training and implementation of ISO 9001:2000 QMS. • Successfully registered and maintained standards for ISO 9001:2000 QMS
-
Systems AdministratorGulfweb International, Kuwait Apr 2000 - Sep 2001• Monitored Network/Server on a daily basis using monitoring tools such as SNMP based Netmon, GFI Network Server Monitor and system wide log monitoring using GFI Languard S.E.L.M (Security Event Log Monitor) and N.S.S. (Network Security Scanner)• Monitored Mail Servers (Exchange Server) using monitoring tools like GFI Mail Essentials for Exchange/SMTP (Having tight integration with Exchange Server).• Successfully lead a team of 12 members (members include Technicians and Administrators) in supporting e-complex clients involving Internet through broadband satellite, centralized fax System using GFI Faxmaker, network gaming and Video on Demand through speedcast using PPTP• Only Support personnel for GFI Mail Essentials, GFI Faxmaker for Middle East.• Network Support for more than 150 workstations (running Windows 2000 Professional) at multiple locations. • Configured Fujitsu Siemens Rack Server in cluster Server environment for external clients on Windows 2000 Advanced Server.• Supervised and mentored other team members, providing training as and when required and provided performance analysis
Jawed Ahmad Skills
Jawed Ahmad Education Details
-
University Of British ColumbiaComputer Science -
Aptech Computer EducationComputer Software Engineering
Frequently Asked Questions about Jawed Ahmad
What company does Jawed Ahmad work for?
Jawed Ahmad works for Bell Cyber
What is Jawed Ahmad's role at the current company?
Jawed Ahmad's current role is Chief Technology Officer.
What is Jawed Ahmad's email address?
Jawed Ahmad's email address is ja****@****ail.com
What schools did Jawed Ahmad attend?
Jawed Ahmad attended University Of British Columbia, Aptech Computer Education.
What skills is Jawed Ahmad known for?
Jawed Ahmad has skills like Firewalls, Security, Network Security, Vpn, Information Security, Cisco Technologies, Virtualization, Juniper, Itil, Vmware, Mcafee, Computer Security.
Who are Jawed Ahmad's colleagues?
Jawed Ahmad's colleagues are Yvon Chartrand, Dziedzic Irene, Mohamad Jamous, Marie Charest, Yunkai Fan, James Oliver, Ali Haydar.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial