Over the past decade, I have had the privilege of serving in various key roles within the Counter-Terrorism Department (CTD) of the Punjab Provincial Police, where I worked in the IT Branch, Cyber Crime Unit, Technical Operations, and Intelligence Branch, Technical Branch DG khan. My journey into cybersecurity began in 2014 when I joined the IT Branch of CTD HQRS. This role marked the beginning of my deep fascination with cyber threats, particularly the intersection of cybercrime and terrorism. My work involved extensive collaboration with international and national ISPs such as Facebook, WhatsApp, Instagram, Google, and IMO to manage data disclosure requests during routine investigations and in emergency situations. I navigated complex legal and regulatory frameworks to obtain critical information for counter-terrorism and criminal investigations. As I advanced through the Cyber Crime Unit and Technical Operations, I gained experience in tackling an increasingly sophisticated range of cyber threats, including online radicalization, terrorist financing, and the use of digital platforms for organizing and executing attacks. This hands-on work reinforced my belief that combating modern terrorism requires not only physical security measures but also a robust digital defense.My expertise in cybersecurity expanded to include penetration testing, vulnerability assessments (VAPT), malware protection, and incident response. I took a leading role in developing and implementing cybersecurity strategies to safeguard critical systems against external threats, using tools like IBM QRadar for real-time monitoring and incident analysis. As a SIEM incident analyst, I fine-tuned our security systems to reduce false positives and proactively identified vulnerabilities in both internal and external systems. Additionally, I led training initiatives to build the capacity of regional and district staff in handling emerging cyber threats. My responsibilities also extended to managing IT infrastructure, overseeing budgets, and ensuring that the department’s digital assets remained secure. Collaboration with national and international agencies such as Interpol and other law enforcement bodies played a key role in expanding the scope of investigations and disrupting cross-border criminal networks. The evolving landscape of cyber threats has made it clear that effective counter-terrorism strategies require a comprehensive, multi-disciplinary approach, and I have strived to contribute to that vision through continuous learning, technical expertise, and global cooperation.
-
Cyber Security ConsultantFast NexaLahore, Pk -
Head Of Cybersecurity OperationsFast Nexa Jan 2025 - PresentLahore, Punjab, PakistanThe Head of Cybersecurity Operations is a senior leadership role responsible for managing and integrating the operational aspects of cybersecurity, focusing on Penetration Testing (PT), Security Operations Center (SOC), and Governance, Risk, and Compliance (GRC). This role ensures the organization's security posture remains resilient against emerging threats, fosters collaboration across teams, and aligns cybersecurity strategies with business objectives.Key Responsibilities1. Strategic Leadership:Develop and implement a comprehensive cybersecurity operations strategy encompassing offensive security (PT), defensive security (SOC), and compliance (GRC).Align cybersecurity goals with the organization’s business objectives to mitigate risks effectively.Act as a liaison between the cybersecurity teams and senior management, communicating risks, strategies, and incidents in business terms.2. Penetration Testing (PT):Oversee the offensive security program, including vulnerability assessments, penetration testing, and red team exercises.Ensure timely identification and remediation of vulnerabilities in systems, networks, and applications.Promote the adoption of secure coding and development practices across the organization.3. Security Operations Center (SOC):Lead the SOC team in monitoring, detecting, and responding to cybersecurity incidents.Establish and enforce incident response plans, including root cause analysis and lessons learned.Ensure effective threat intelligence gathering and sharing across relevant teams.4. Governance, Risk, and Compliance (GRC):Supervise GRC programs to ensure compliance with industry standards, regulations, and frameworks (e.g., ISO 27001, NIST, GDPR).Conduct regular risk assessments and audits to maintain a strong security posture.Lead efforts to create policies, procedures, and controls that mitigate risks and address regulatory requirements. -
Cyber Security ConsultantFast Nexa Dec 2024 - PresentLahore, Punjab, PakistanDesigning and implementing robust security solutions tailored to organizational needs.Penetration testing and vulnerability assessments.Managing security tools, including intrusion detection systems.Conducting external and internal network testing, web application testing, wireless testing, and social engineering assessments.Leading incident response efforts, investigating security breaches, containing impacts, implementing remediations, and conducting post-incident analysis.Aligning security strategies with business objectives.Communicating risks and solutions effectively to non-technical stakeholders.Regulatory Compliance frameworks like GDPR, HIPAA, PCI DSS, and ISO 27001, guiding organizations toward compliance.Delivering tailored consultancy services, assessing client needs, and navigating complex organizational structures.Translating technical concepts into actionable business strategies.Ensuring cybersecurity measures bolster business resilience and continuity.Security excellence, reducing risks, and empowering organizations to operate securely in an ever-evolving threat landscape. -
In The Top 2 % - Worldwide TryhackmeTryhackme Jan 2021 - PresentOnlineProfile: https://tryhackme.com/p/MahtabkhalidRoom Completed:Content Discovery, Burp Suite: The Basics, Pentesting Fundamentals, Principles of Security, Walking An Application, Nmap, Kenobi, Vulnversity, Hydra, Web Application Security, Metasploit: Introduction, Vulnerabilities 101, Burp Suite: Repeater, HTTP in detail, OWASP Juice Shop, OWASP Top 10, Nessus, Post-Exploitation Basics, Attacktive Directory -
In The Top 100 In Blue Teaming - CyberdefendersCyberdefenders Dec 2019 - PresentRemotePractice different digital forensics and siem security solutions -
Guru Rank @ Hackthebox - In Top 100 Hackers WorldwideHackthebox - Dr. Aith Mar 2017 - PresentI achieved the Guru rank on HackTheBox by successfully hacking into various machines, networks, and systems. I rooted 43 different active and retired Windows and Linux-based machines. Among top 100 hackers world wide. -
Corporal @ Int Branch Ctd HqCounter Terrorism Department, Punjab Provincial Police Pakistan Sep 2023 - Dec 2024Lahore, Punjab, Pakistan•Engage stakeholders within IT and business function to track vulnerabilities and ensure its closure and perform periodic security assessment of all products with regards to newly discovered attack vectors.•Conducting security awareness sessions for regional and district Staff, capacity building, preparation of training modules and presentation and KPI’s•Devising and establishing IT policies and systems to support the implementation of strategies set by upper management•Analyzing the business requirements of all departments to determine their technology needs. Overseeing all technology operations and evaluating them according to established goals.•Inspect the use of technological equipment and software to ensure functionality and efficiency. Identify the need for upgrades, configurations or new systems and report to upper management•Coordinate IT managers and supervise computer scientists, technicians and other professionals to provide guidance
-
Corporal @ Technical Ctd HqrsCounter Terrorism Department, Punjab Provincial Police Pakistan Oct 2019 - Sep 2023Lahore, Punjab, Pakistan•Operate a hands-on role involving penetration testing and vulnerability assessment activities of complex applications, operating systems, wired and wireless networks, and web applications/devices.•Communicate security issues to a wide variety of internal and external customers to include technical teams, executives, risk groups, vendors and regulators.Develop and maintain security testing plans. Automate penetration and other security testing on networks, systems and applications. Develop meaningful metrics to reflect the true posture of the environment allowing the organization to make educated decisions based on risk.•Engage stakeholders within IT and business function to track vulnerabilities and ensure its closure and perform periodic security assessment of all products with regards to newly discovered attack vectors.•Performed dynamic and static analysis of web application using IMB AppScan, Nesses and Acunetix. Analyze systems for potential vulnerabilities that may result from improper system configuration.•Ran vulnerability and compliance scanning on test machines and reviewed security standard and minimum security baseline for the client. Assisted on Monthly conference call to discuss implementation and upgrade of critical infrastructure.•SIEM: Incident Analysis and Response: Splunk/QRadar Alerts Analysis, Creating Splunk/QRadar quires for daily investigation tasks. IBM QRadar: Incident Response and Analysis, use cases tuning to reduce false positives, creating use cases to detect different suspicious activities.•Installing, managing, and updating software (VPN, IDS/IPS, DLP and Firewall) on the systems and networks they monitor. Developing plans to protect against malware and procedures for attack response.•Reviewed security documentation and make recommendation. Assisted in conference call meeting with Developer to mitigate vulnerability findings and patch management
-
Cyber Crime Unit Ctd HqrsCounter Terrorism Department, Punjab Provincial Police Pakistan Sep 2017 - Oct 2019Lahore, Punjab, PakistanPrimary Focal Point of Contact for Law Enforcement Response team on Social MediaPlatforms (Facebook, WhatsApp, Google, IMO, Viber, Dingtone)•Tracing of Person through Technical Data Analysis, Call Data Record Analysis, SMSData Record Analysis, Location Record Analysis, IMEI, IMSI Data Analysis, IP DataAnalysis, IBM Analyst Note Book.•Blocking of Content – Social Media Platforms, Coordination with PTA, Regional andDistrict offices regarding content Blocking.•Legal guidance and decision making initiatives.•Operate a hands-on role involving penetration testing and vulnerability assessmentactivities of complex applications, operating systems, wired and wireless networks,and web applications/devices.•Develop and maintain security testing plans. Automate penetration and other securitytesting on networks, systems and applications. Develop meaningful metrics to reflectthe true posture of the environment allowing the organization to make educateddecisions based on risk.•Produce actionable, threat-based, reports on security testing results•Engage stakeholders within IT and business function to track vulnerabilities andensure its closure and perform periodic security assessment of all products withregards to newly discovered attack vectors.
-
It Branch Ctd HqrsCounter Terrorism Department, Punjab Provincial Police Pakistan Jul 2014 - Sep 2017Lahore, Punjab, PakistanManage information technology and computer systems Plan, organize, control andevaluate IT and electronic data operations.Manage IT staff by recruiting, training and coaching employees, communicating jobexpectations and appraising their performance.•Design, develop, implement and coordinate systems, policies and procedures.•Ensure security of data, network access and backup systems.•Act in alignment with user needs and system functionality to contribute toorganizational policy.•Identify problematic areas and implement strategic solutions in time.•Audit systems and assess their outcomes.•Preserve assets, information security and control structures.•Handle annual budget and ensure cost effectiveness.•Reviewed security documentation and make recommendation Assisted in conferencecall meeting with Developer to mitigate vulnerability findings and patch management.•Installing, managing, and updating software (VPN, IDS/IPS, DLP and Firewall) on thesystems and networks they monitor. Developing plans to protect against malware andprocedures for attack response.•Monitoring networks for all incoming code and responding to any negative activity.Analyzing existing networks to provide suggestions and best practices to maintaindata security.
Mahtab Khalid Education Details
Frequently Asked Questions about Mahtab Khalid
What company does Mahtab Khalid work for?
Mahtab Khalid works for Fast Nexa
What is Mahtab Khalid's role at the current company?
Mahtab Khalid's current role is Cyber Security Consultant.
What schools did Mahtab Khalid attend?
Mahtab Khalid attended Riphah International University, Virtual University Of Pakistan.
Not the Mahtab Khalid you were looking for?
-
Mahtab Khalid
-Amazon Account Manager || Product Research Specialist || Product Hunting Expert || Business Consultant ||Multan District -
MAHTAB KHALID
Holds Certified Tls In Cycle-3. Dedicated High School English Teacher • Excel In Classroom Management And Formative Assessment • Passionate About Creative Learning And Student Engagement.Dubai, United Arab Emirates -
Mahtab Khalid
Développeur Web & Designer Graphique | Passionné Par La Création De Contenus Visuels Innovants Et PerformantsParis -
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial