Wajahat M

Wajahat M Email and Phone Number

Cyber Security Analyst/System Administrator @
Wajahat M's Location
Milton, Ontario, Canada, Canada
About Wajahat M

Industry Knowledge/ Interpersonal Skills/ToolsIT policies and regulations, including the DoD Cybersecurity 8500 series. ISO 27002/PCI-DSS/ITIL/TOGAF/PIPEDA/GDPR, AGILE methodology and Software Defined Networks. Understanding of how malicious code operates and how vulnerabilities are exploited. Troubleshooting and requirements analysis NIST Special Publications, FISMA, OMB requirements, and cyber security best practices. Ability to support existing operational workflows in a timely, effective and detailed manner. Threat Hunting - Security Requirements Traceability Matrices (SRTM). Able to manage multiple projects under strict timelines, Critical thinker with strong problem-solving skills. Solid understanding of web application infrastructure and the common attack methods used my malicious adversaries. Solid understanding of forensic technologies and ability to capture and review forensic disk images. Security event report automation and automating feeds to other security technologies. Application debugging. Developing processes, implementing controls, and writing or working with information security policies. Network administration experience (routing and switching, connectivity troubleshooting, firewalls). Possesses comprehensive understanding of, and substantive experience in, the areas of network systems engineering, computing systems and software applications. Computer-based training and learning management systems (LMS). Network monitoring tools such as WireShark/ Palo Alto FW Administration/ Splunk SPL/ Zscaler ZIA. Experience developing information security policies and procedures. Strong understanding of the SA&A process and all documentation required. Strong understanding of ITSG-22, ITSG 33 and other standards. Strong knowledge of core IT and Security infrastructures including Active Directory, Microsoft Windows security controls, SIEM, AV, IPS, vulnerability scanners, Microsoft Azure/Office 365 security and compliance/Office DLP/Exchange Online Protection/Microsoft MFA/SSO/Conditional Access/B2B/B2C. Strong knowledge of all aspects of information security within the Prevent, Detect and Respond domains. Application scanning experience using tools such as Fortify, Coverity, BlackDuck, Seeker & Burpsuite. Exposure to Azure and AWS/Google Cloud Platform/ AWS cloud environment (AWS GuardDuty, Security Hub, Trusted Advisor, IAM Access Analyzer, CloudWatch Anomaly Detection. Knowledge of network and host IDS/IPS/VPN Administration. Ability to analyze and understand technical information.

Wajahat M's Current Company Details
Global IT Consultancy Services (GITCS) INC

Global It Consultancy Services (Gitcs) Inc

Cyber Security Analyst/System Administrator
Wajahat M Work Experience Details
  • Global It Consultancy Services (Gitcs) Inc
    Cybersecurity Analyst
    Global It Consultancy Services (Gitcs) Inc May 2019 - Present
    Toronto, Ontario, Canada
    Ensuring that the company's digital assets are protected from unauthorized access. This includes securing both online and on-premise infrastructures, weeding through metrics and data to filter out suspicious activity, and finding and mitigating risks before breaches occur. Ensure that risk considerations are addressed at each phase of the development and deployment life cycle of a system.Evaluate the posture in terms of risk of one or more business units; • Produce, maintain and communicate indicators (progress, performance, risk, etc.). Proactively propose solutions to reduce the risk of future breaches.Recommend security measures in applications and infrastructure components by exercising judgment within existing policies and industry best practices.Generating reports for IT administrators and business managers to evaluate the efficacy of the security policies in place. Make the necessary changes for a more secure network and may also create training programs and modules to educate employees and users on proper security protocols.Keeping the company's security systems up to date and creating documentation and planning for all security-related information, including incident response and disaster recovery plans.Monitoring security access, Conducting security assessments through vulnerability testing and risk analysis, Performing both internal and external security audits, Analyzing security breaches to identify the root cause, Continuously updating the company’s incident response and disaster recovery plans, Verifying the security of third-party vendors and collaborating with them to meet security requirements
  • Global It Consultancy Services (Gitcs) Inc
    Cybersecurity Analyst, Junior
    Global It Consultancy Services (Gitcs) Inc May 2018 - May 2019
    Canada
    • Proactively ‘hunt’ for potential threat actors on the network and provide recommendations• Work with other groups to ensure continuity and coverage of the enterprise• Develop, operationalize and contribute to core Cyber Security and Data Protection functions including but not limited to SOC and Incident Response• Establish and manage responsible program measurement (e.g.KPIs)• Analyzes and assesses vulnerabilities in the infrastructure (software, hardware, networks) and provide recommendations• Investigates available tools and countermeasures to remedy the detected vulnerabilities, and recommends solutions and best practices• Analyzes and assesses damage to the data/infrastructure as a result of security incidents, examines available recovery tools and processes, and recommends solutions• Analyzes software support requirements• Contributes towards support approach, Estimation, Software Deployment Guide, Supplemental or non-functional specification• Conduct Vulnerability Assessment for the supported Infrastructure and applications• Conduct Cyber-Threat analysis and provide best practices methodology for the team• Contribute to the success of forensics capabilities• Extend proactive monitoring of enterprise network and systems• Address identified and confirmed security events in a timely manner and provide recommendations
  • Utm-Mimo, Universiti Teknologi Malaysia (Utm), Skudai, Johor, Malaysia
    Principal Network Engineer
    Utm-Mimo, Universiti Teknologi Malaysia (Utm), Skudai, Johor, Malaysia Jan 2015 - Dec 2015
    Malaysia
    Research, investigate and develop advance Networks protocols.
  • Utm-Mimos Center Of Excellence, Fke, Utm
    Research And Development Network Security Engineer
    Utm-Mimos Center Of Excellence, Fke, Utm Jan 2014 - Dec 2014
    Malaysia
    Research and develop the Privacy Key Management (PKM) protocol to ensure security measures in MMR networks and consider several security threats, specifically Denial of Service (DoS), replay attacks, Man in the Middle (MitM) attacks and the interleaving attacks.
  • Utm-Mimos Center Of Excellence, Fke, Utm
    Mesh Network System Specialist
    Utm-Mimos Center Of Excellence, Fke, Utm Jan 2013 - Dec 2013
    Malaysia
    Research and develop the Network MAC layer improve model for Cognitive Radio Wireless Mesh Network (CWMN)
  • Utm-Mimos Center Of Excellence
    Internet Of Things (Iot) Engineer
    Utm-Mimos Center Of Excellence Jan 2012 - Jun 2012
    Malaysia

Frequently Asked Questions about Wajahat M

What company does Wajahat M work for?

Wajahat M works for Global It Consultancy Services (Gitcs) Inc

What is Wajahat M's role at the current company?

Wajahat M's current role is Cyber Security Analyst/System Administrator.

What schools did Wajahat M attend?

Wajahat M attended Universiti Teknologi Malaysia, Balochistan University Of Information Technology And Management Sciences, Mehran University Of Engineering And Technology.

Not the Wajahat M you were looking for?

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.