Aspiring cybersecurity professional with a strong foundation in networking and cybersecurity. I have completed key courses such as CCNA: Introduction to Networks, Switching, Routing, and Wireless Essentials, Enterprise Networking, Security, and Automation from Cisco, and Introduction to Cybersecurity from CyberTalents. I am currently pursuing GSEC Preparation (SEC401) at Cyber Dojo.My skills include developing comprehensive security programs, addressing high-priority vulnerabilities, evolving defensive strategies, and using advanced techniques to prevent, detect, and respond to ransomware attacks. I am proficient in optimizing network security architecture with VLANs, NAC, and IEEE 802.1X, and mastering IAM with MFA for robust authentication processes.I leverage cloud security strengths from AWS, Microsoft Azure, and Google Cloud, and use sophisticated tools to identify and mitigate system vulnerabilities. Additionally, I analyze network traffic with tools like tcpdump and Wireshark and conduct deep system analyses to detect high-risk indicators of compromise. My goal is to construct detailed network visibility maps to support attack surface analysis and guide strategic security hardening.
-
Grc SpecialistInformation Technology Solutions- Its -
Grc SpecialistInformation Technology Solutions- Its Aug 2024 - Present -
Cyber Security PractitionerCyber Dojo Mar 2024 - Jul 2024Currently taking GSEC Preparation (SEC401) Course:o Develop a comprehensive security program that integrates proactive detection, rapid response, and prevention strategies to combat evolving cybersecurity threatso Tackle critical security challenges by addressing high-priority vulnerabilities and implementing robust security measures within our organizationo Evolve defensive strategies to stay ahead of adversaries by analyzing and adapting to their tacticso Prevent, detect, and… Show more Currently taking GSEC Preparation (SEC401) Course:o Develop a comprehensive security program that integrates proactive detection, rapid response, and prevention strategies to combat evolving cybersecurity threatso Tackle critical security challenges by addressing high-priority vulnerabilities and implementing robust security measures within our organizationo Evolve defensive strategies to stay ahead of adversaries by analyzing and adapting to their tacticso Prevent, detect, and respond to ransomware attacks more effectively by using advanced techniqueso Optimize network security architecture using VLANs, Network Access Control (NAC), and IEEE 802.1X based on indicators of compromise to fortify against advanced persistent threatso Master Identity and Access Management (IAM) to ensure robust authentication processes including Multi-Factor Authentication (MFA) are in place, enhancing security across all systemso Capitalize on cloud security strengths by leveraging the unique features and security capabilities of the top cloud providers: AWS, Microsoft Azure, and Google Cloudo Identify and mitigate system vulnerabilities using sophisticated tools to scan, detect, and secure systems from visible and latent security weaknesseso Analyze network traffic with tools like tcpdump and Wireshark to uncover malicious activitieso Conduct deep system analysis to detect high-risk indicators of compromiseo Construct a detailed network visibility map that supports comprehensive attack surface analysis and guides strategic security hardening and configuration management efforts. Show less -
Cyber Security PractitionerCybertalents Apr 2024 - May 2024Took Introduction to Cybersecurity Cohort 7This course is designed to provide participants with the essential knowledge and background to learn about cybersecurity and get started in the field. Moreover, this course helps participants to engage in online worldwide Capture the Flag (CTF) hacking contests. Through this course, various topics in cybersecurity are covered, including Web Hacking, Reverse Engineering, Cryptography, and Digital Forensics. Each field is introduced with live… Show more Took Introduction to Cybersecurity Cohort 7This course is designed to provide participants with the essential knowledge and background to learn about cybersecurity and get started in the field. Moreover, this course helps participants to engage in online worldwide Capture the Flag (CTF) hacking contests. Through this course, various topics in cybersecurity are covered, including Web Hacking, Reverse Engineering, Cryptography, and Digital Forensics. Each field is introduced with live examples from previous CTFs, offering practical insights and hands-on experience.Topics Covered- Web Hacking: Techniques and methodologies to identify and exploit web vulnerabilities.- Reverse Engineering: Understanding the process of deconstructing software to uncover how it works.- Cryptography: Exploring encryption methods and cryptographic challenges.- Digital Forensics: Techniques for investigating digital devices and uncovering digital evidence. Show less
Mayar Khaled Education Details
-
Computer Systems Networking And Telecommunications -
Eaeat AcademyV.Good
Frequently Asked Questions about Mayar Khaled
What company does Mayar Khaled work for?
Mayar Khaled works for Information Technology Solutions- Its
What is Mayar Khaled's role at the current company?
Mayar Khaled's current role is GRC Specialist.
What schools did Mayar Khaled attend?
Mayar Khaled attended National Telecommunication Institute (Nti), Eaeat Academy.
Not the Mayar Khaled you were looking for?
-
Mayar Altahan
Graduated From Tanta University With Bachelor Degree In Accounting 2024 And Started MbaTanta -
-
-
-
Mayar Khaled
New Cairo
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial