Industry Knowledge/ Interpersonal Skills/ToolsIT policies and regulations, including the DoD Cybersecurity 8500 series. ISO 27002/PCI-DSS/ITIL/TOGAF/PIPEDA/GDPR, AGILE methodology and Software Defined Networks. Understanding of how malicious code operates and how vulnerabilities are exploited. Troubleshooting and requirements analysis NIST Special Publications, FISMA, OMB requirements, and cyber security best practices. Ability to support existing operational workflows in a timely, effective and detailed manner. Threat Hunting - Security Requirements Traceability Matrices (SRTM). Able to manage multiple projects under strict timelines, Critical thinker with strong problem-solving skills. Solid understanding of web application infrastructure and the common attack methods used my malicious adversaries. Solid understanding of forensic technologies and ability to capture and review forensic disk images. Security event report automation and automating feeds to other security technologies. Application debugging. Developing processes, implementing controls, and writing or working with information security policies. Network administration experience (routing and switching, connectivity troubleshooting, firewalls). Possesses comprehensive understanding of, and substantive experience in, the areas of network systems engineering, computing systems and software applications. Computer-based training and learning management systems (LMS). Network monitoring tools such as WireShark/ Palo Alto FW Administration/ Splunk SPL/ Zscaler ZIA. Experience developing information security policies and procedures. Strong understanding of the SA&A process and all documentation required. Strong understanding of ITSG-22, ITSG 33 and other standards. Strong knowledge of core IT and Security infrastructures including Active Directory, Microsoft Windows security controls, SIEM, AV, IPS, vulnerability scanners, Microsoft Azure/Office 365 security and compliance/Office DLP/Exchange Online Protection/Microsoft MFA/SSO/Conditional Access/B2B/B2C. Strong knowledge of all aspects of information security within the Prevent, Detect and Respond domains. Application scanning experience using tools such as Fortify, Coverity, BlackDuck, Seeker & Burpsuite. Exposure to Azure and AWS/Google Cloud Platform/ AWS cloud environment (AWS GuardDuty, Security Hub, Trusted Advisor, IAM Access Analyzer, CloudWatch Anomaly Detection. Knowledge of network and host IDS/IPS/VPN Administration. Ability to analyze and understand technical information.
Global It Consultancy Services (Gitcs) Inc
-
Cybersecurity AnalystGlobal It Consultancy Services (Gitcs) Inc May 2019 - PresentToronto, Ontario, CanadaEnsuring that the company's digital assets are protected from unauthorized access. This includes securing both online and on-premise infrastructures, weeding through metrics and data to filter out suspicious activity, and finding and mitigating risks before breaches occur. Ensure that risk considerations are addressed at each phase of the development and deployment life cycle of a system.Evaluate the posture in terms of risk of one or more business units; • Produce, maintain and communicate indicators (progress, performance, risk, etc.). Proactively propose solutions to reduce the risk of future breaches.Recommend security measures in applications and infrastructure components by exercising judgment within existing policies and industry best practices.Generating reports for IT administrators and business managers to evaluate the efficacy of the security policies in place. Make the necessary changes for a more secure network and may also create training programs and modules to educate employees and users on proper security protocols.Keeping the company's security systems up to date and creating documentation and planning for all security-related information, including incident response and disaster recovery plans.Monitoring security access, Conducting security assessments through vulnerability testing and risk analysis, Performing both internal and external security audits, Analyzing security breaches to identify the root cause, Continuously updating the company’s incident response and disaster recovery plans, Verifying the security of third-party vendors and collaborating with them to meet security requirements
-
Cybersecurity Analyst, JuniorGlobal It Consultancy Services (Gitcs) Inc May 2018 - May 2019Canada• Proactively ‘hunt’ for potential threat actors on the network and provide recommendations• Work with other groups to ensure continuity and coverage of the enterprise• Develop, operationalize and contribute to core Cyber Security and Data Protection functions including but not limited to SOC and Incident Response• Establish and manage responsible program measurement (e.g.KPIs)• Analyzes and assesses vulnerabilities in the infrastructure (software, hardware, networks) and provide recommendations• Investigates available tools and countermeasures to remedy the detected vulnerabilities, and recommends solutions and best practices• Analyzes and assesses damage to the data/infrastructure as a result of security incidents, examines available recovery tools and processes, and recommends solutions• Analyzes software support requirements• Contributes towards support approach, Estimation, Software Deployment Guide, Supplemental or non-functional specification• Conduct Vulnerability Assessment for the supported Infrastructure and applications• Conduct Cyber-Threat analysis and provide best practices methodology for the team• Contribute to the success of forensics capabilities• Extend proactive monitoring of enterprise network and systems• Address identified and confirmed security events in a timely manner and provide recommendations
-
Principal Network EngineerUtm-Mimo, Universiti Teknologi Malaysia (Utm), Skudai, Johor, Malaysia Jan 2015 - Dec 2015MalaysiaResearch, investigate and develop advance Networks protocols.
-
Research And Development Network Security EngineerUtm-Mimos Center Of Excellence, Fke, Utm Jan 2014 - Dec 2014MalaysiaResearch and develop the Privacy Key Management (PKM) protocol to ensure security measures in MMR networks and consider several security threats, specifically Denial of Service (DoS), replay attacks, Man in the Middle (MitM) attacks and the interleaving attacks.
-
Mesh Network System SpecialistUtm-Mimos Center Of Excellence, Fke, Utm Jan 2013 - Dec 2013MalaysiaResearch and develop the Network MAC layer improve model for Cognitive Radio Wireless Mesh Network (CWMN)
-
Internet Of Things (Iot) EngineerUtm-Mimos Center Of Excellence Jan 2012 - Jun 2012Malaysia
Wajahat M Education Details
Frequently Asked Questions about Wajahat M
What company does Wajahat M work for?
Wajahat M works for Global It Consultancy Services (Gitcs) Inc
What is Wajahat M's role at the current company?
Wajahat M's current role is Cyber Security Analyst/System Administrator.
What schools did Wajahat M attend?
Wajahat M attended Universiti Teknologi Malaysia, Balochistan University Of Information Technology And Management Sciences, Mehran University Of Engineering And Technology.
Not the Wajahat M you were looking for?
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial