Profile cover photo
You're now following
Error following user.
This user does not allow users to follow them.
You are already following this user.
Your membership plan only allows 0 follows. Upgrade here.
Successfully unfollowed
Error unfollowing user.
You have successfully recommended
Error recommending user.
Something went wrong. Please refresh the page and try again.
Email successfully verified.
User Avatar
$50 USD / hour
Flag of UNITED KINGDOM
manchester, united kingdom
$50 USD / hour
It's currently 7:08 PM here
Joined March 21, 2024
0 Recommendations

Zahid M.

@CyberBuddy25

5.0 (1 review)
0.9
0.9
100%
100%
$50 USD / hour
Flag of UNITED KINGDOM
manchester, united kingdom
$50 USD / hour
100%
Jobs Completed
100%
On Budget
100%
On Time
N/A
Repeat Hire Rate

Cyber Security Specialist (M.Sc, CISSP & CEH)

I'm a cyber security specialist. I have more than 5 years of experience in information technology, cyber security, and risk management, and hold certifications in Certified Information System Security Professional (CISSP), ethical hacking (CEH), CompTIA Cyber Security Analyst (CySA) and cloud computing. My core competencies include asset security, technical support, cyber security operations, Risk assessment and Vulnerability management, and design and implementation of security policies. At my current company, I am responsible for protecting the company's information systems, web applications, email, and endpoints from cyber threats and incidents. I lead the incident response team, perform vulnerability scans, threat hunting, user investigations, and risk assessments, and implement security policies and controls. I also supervise a security operations administrator who focuses on vulnerability management and risk mitigation. I am passionate about customer satisfaction, communication, and problem-solving, and strive to ensure the company's compliance with internal and external security standards and regulations. You can review my LinkedIn profile for further details: [login to view URL] ---------------------------------------------- Key Competencies ------------------------------------------ • Offering comprehensive security solutions to clients. • Possessing a solid grasp of security, system, and network technologies. • Demonstrating successful collaboration with large organizations. • Articulating technical requirements in business terms effectively. • Familiarity with SDLC, encompassing waterfall and Agile methodologies. • Sound understanding of the "Defense in Depth" layered security architecture model. • Proficiency in operational security and its real-world implications. • Competence in conducting vulnerability analysis on web applications, network, infrastructure, and operating systems. • Prioritizing customer satisfaction and delivering projects that bring tangible value to clients. • Displaying eagerness to delve into technical inquiries from various perspectives. • Exhibiting enthusiasm and adaptability in tackling challenges. • Possessing strong analytical and diagnostic skills. • Keeping up to date with prevalent web vulnerabilities. • Maintaining knowledge of contemporary standards, practices, procedures, and methods. • Excellent presentation and communication skills • Clearly articulating complex concepts both in written and verbal form. • Demonstrating active listening skills, particularly when engaging with customers.

Contact Zahid M. about your job

Log in to discuss any details over chat.

Reviews

Changes saved
Showing 1 - 1 out of 1 reviews
Filter reviews by:
5.0
£23.00 GBP
Zahid delivered outstanding results on our project. Their professionalism, attention to detail, and timely communication made the collaboration seamless. I highly recommend Zahid for any future projects. Looking forward to collaborate again.
Web Security
Testing / QA
Software Testing
Amazon Web Services
Internet Security
User Avatar
Flag of Ejaz A.
@aliejaz788
1 month ago

Experience

Cyber Security Manager

Addison Lee
Nov 2022 - Present
• Conduct vulnerability scanning and address identified vulnerabilities. • Monitoring and responding to security incidents and alerts. • Performing investigations on security incidents. • Acting as an incident responder. • Monitoring the SOC system and managing the external SOC team. • Analyzing firewall and IPS logs. • Supervise external pen testers • Utilizing Microsoft 365 Defender for enhanced security.

Data Security Manager

Specialist Motor Finance
Mar 2022 - Nov 2022 (8 months, 1 day)
• Developing and deploying security policies. • Monitoring and responding to security incidents and alerts. • Conduct investigations into security incidents. • Monitoring the SIEM system. • PCI DSS guidelines to ensure organizational security. • Analyzing firewall and IDS logs. • Leveraging Microsoft 365 Defender for enhanced endpoint security. • Safeguarding data through robust security measures. • Overseeing Mimecast web content filtering and email gateway monitoring.

Cyber Security Architect

OneMSP
Oct 2021 - Dec 2021 (2 months, 1 day)
• Guided the technical management of secure environments. • Created a security roadmap for clients to ensure continuous monitoring and improvement of their security measures. • Microsoft 365 Defender. • Implemented an "Attack Surface Reduction Policy" to enhance protection against cyber-attacks on the organization's devices and network. • Enabled Multifactor Authentication as an additional layer of security. • Implemented Least Privilege Access Control across the organization.

Education

Data Security and Networking

University of Wales, Cardiff, United Kingdom 2016
(Less than a year)

M.Sc Computer Science

Swansea University, United Kingdom 2013 - 2015
(2 years)

Qualifications

Google Cybersecurity Certificate

Google
2024
Those who earn the Google Cybersecurity Certificate have completed eight courses, developed by Google, that include hands-on, practice-based assessments and are designed to prepare them for entry-level roles in cybersecurity. They are competent in beginner-level Python, Linux, SQL, Security Information and Event Management (SIEM) tools, and Intrusion Detection Systems (IDS). They know how to identify common cybersecurity risks, threats, and vulnerabilities, as well as the techniques to mitigate.

Connect and Protect: Networks and Network Security

Google
2024
Connect and Protect: Networks and Network Security

Automate Cybersecurity Tasks with Python

Google
2024
Automate Cybersecurity Tasks with Python

Contact Zahid M. about your job

Log in to discuss any details over chat.

Verifications

Preferred Freelancer
Identity Verified
Payment Verified
Phone Verified
Email Verified
Facebook Connected
Previous User Next User
Invite sent successfully!
Thanks! We’ve emailed you a link to claim your free credit.
Something went wrong while sending your email. Please try again.
Registered Users Total Jobs Posted
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)
Copyright © 2024 Freelancer Technology Pty Limited (ACN 142 189 759)
Loading preview
Permission granted for Geolocation.
Your login session has expired and you have been logged out. Please log in again.