Urdu
100%English
90%Punjabi
80%Arabic
20%Adaptability
100%Problem-Solving & Critical Thinking
100%Communication
90%Team Leadership & Mentorship
75%knowledge
Amazon Web Services (AWS)
Microsoft Azure
Google Cloud Platform (GCP)
Splunk.
IBM QRadar
FortiSIEM
Kali Linux
Metasploit
- Brupsuit
Employment History
University of London
Summary
A certified Master of Information Security and Computer Forensics with a proven track record in both proactive cybersecurity and digital forensics. I specialize in building robust security infrastructures and leading technical teams.
My expertise includes Firewall Management, Network Security, and Cloud Security, along with hands-on experience using SIEM/SOAR solutions (Splunk, QRadar) for real-time threat detection. I am highly skilled in Vulnerability Assessment, Penetration Testing, and Incident Response.
As a Cybersecurity Instructor, I excel at simplifying complex topics and mentoring aspiring professionals. I am committed to a "security-first" approach, helping organizations strengthen their defenses and mitigate risk.
Key Skills 🛡️
Security Operations: SIEM/SOAR, Threat Analysis, Incident Response
Network Security: Firewalls, IDS/IPS, Network Hardening
Cloud Security: IAM, CSPM, Data Encryption
Cybersecurity & Forensics: VAPT, Threat Modeling, Digital Forensics
Technical Leadership: Team Management, Training, Project Leadership
Advanced Diploma in Professional Computing & Information Technology
Institute of Commercial Management (ICM)
This Advanced Diploma is a professional certification that validates a comprehensive understanding of computing and information technology principles. The program's curriculum provided a robust foundation in essential areas, including:
Networking and Connectivity: Gained knowledge of advanced network architectures, protocols, and security principles.
Database Management: Learned to design, implement, and manage relational databases for efficient data handling.
Systems Analysis and Design: Acquired skills in analyzing business requirements and designing effective IT solutions.
Professional IT Practices: Developed a strong understanding of IT project management, security, and ethical considerations in the tech industry.
This qualification enhanced my technical expertise and prepared me to tackle complex challenges in the ever-evolving IT landscape.
Industrial Instructor
Cultivated an inclusive and dynamic learning environment, consistently receiving positive feedback from students.
Delivered expert instruction on cybersecurity topics to adult learners, aligning with NAVTTC curriculum and leveraging best practices to enhance student engagement.
Integrated real-world industry insights and professional experience into lessons, bridging the gap between theoretical knowledge and practical application for students.
Managed regular communication with students, providing timely feedback, celebrating progress, and implementing interventions to ensure high student retention and satisfaction.
Evaluated student performance against course competencies, providing constructive, timely feedback and maintaining accurate records to support their professional development.
Technical Director
Provided team leadership and project management for a technical department, guiding teams through complex projects from design to implementation.
Led the development of a comprehensive Cyber Defense and Information Security strategy, improving the company’s overall security posture.
Conducted regular Vulnerability Assessments and Penetration Testing to identify and remediate security weaknesses in client systems.
Managed technical budgets and resources to ensure projects were completed efficiently and within financial constraints.
Oversaw security awareness training programs, educating employees on best practices to reduce human-related security risks.
Network And Audit Officer
Conducted regular network audits and assessments to ensure compliance with security policies and standards.
Managed information security and performed security monitoring to protect the network infrastructure from unauthorized access.
Contributed to the design and implementation of firewall rules and access controls.
