Ahmed Faraz

I'm

About

Cyber Security graduate with knowledge in a variety of cyber security components. Two years of experience in technical support. Energetic self-starter, problem-solver, and team player with outstanding technical, analytical, and communication skills. Fast learner with the ability to grasp new threats, concepts, and technologies.

OSINT Specialist | Threat Investigator | Pentester | Developer

Never stop learning, because life never stops teaching.

Core Skills:

  • Operating Systems: Windows, Linux
  • Languages: C++, Python, Javascript, HTML, CSS
  • Pentest: OWASP ZAP, Burp Suite, FeroxBuster, DirBuster, Nmap, Metasploit, Sqlmap, Hydra, Wireshark, w3af, Manual Pentesting
  • OSINT: Maltego, Google Dorks, The Harvester, Metagoofil, Recon-ng, Dark Web
  • SOC: Monitoring, Vulnerability Assessment, QRadar (Basic)

The information security industry is on high alert due to a number of new and growing cybersecurity threats. The data and assets of businesses, governments, and individuals are always at risk due to more complex cyberattacks involving malware, phishing, machine learning and artificial intelligence, cryptocurrencies, and more.

Fun Facts

Cybersecurity involves more than just a computer screen or hidden hackers. Because cybersecurity is a necessity for everyone, it is one of the career categories with the greatest growth. Everything connected to our data and its safety falls under the category of cybersecurity.

Human error accounts for all data breaches.

The number of phishing attack victims increased in 2021, and remains the #1 type of cyber crime.

Employees who do not follow guidelines have become the top barrier to IT security.

10.5 Trillion

By 2025, cybercrime is expected to cost the world.

Skills

I aim to attain challenging position in a reputable organization to expand and utilize my learning, skills and knowledge.

OSINT 90%
Pentest80%
Threat Investigation 80%
SOC 60%
Python 90%
C/C++ 90%

Resume

Sumary

Ahmed Faraz

Diligent cyber security specialist skilled in planning, implementing, and maintaining online security. Adept at instructing and educating internal users on necessary cyber security processes. Especially in professional and corporate contexts, focus on Threat Investigation, OSINT, and working to prevent cyberattacks.

  • Islamabad

Education

Bachelor in Cyber Security

2018 - 2022

Air University, Islamabad

HSSC

2018

GOVT. Degree College, DG-Khan

Skills

Languages

C/C++
Python
Flask
Javascript
SQL
HTML
CSS

Cyber Security

Vulnerability scanning and assessment
Penetration testing techniques
Firewall management
Intrusion detection and prevention systems (IDS/IPS)
Incident response and management
Social engineering detection and mitigation
Proficiency in securing various OS
User access controls and permissions
Forensics analysis
Proficiency in secure coding practices
Developing custom security tools with Python

Cyber Security Tools

  • OWASP ZAP
  • Burp Suite
  • FeroxBuster
  • DirBuster
  • Nessus
  • Wireshark
  • QRadar (Basics)
  • SET Toolkit
  • Metasploit
  • Recon-ng
  • FTK Imager
  • HxD hex editor
  • Exif tool
  • Linux
  • Prefered Interests

  • DevOps
  • SOC
  • OSINT
  • Penetration testing
  • Work Experience

    National Center For Cyber Security | Air University

    November 2022 - December 2022

    Research Assistant

    • Developed and maintained Python-based mobile device forensics software.
    • Collaborated with team of experts to enhance and optimize software tools.
    • Stayed updated with mobile technology advancements and encryption mechanisms.
    • Implemented data extraction algorithms for Android devices.
    • Conducted rigorous testing, debugging, and quality assurance.
    • Created technical documentation, including user guides and API documentation.
    • Integrated software with cybersecurity tools and platforms.
    • Participated in code reviews and suggested improvements to coding standards and practices

    Internship at NECOP

    May 2022 - August 2022

    National Electronic of Pakistan, Islamabad

    • Internship focused on hardware security, specializing in Power Analysis Attacks (PAA).
    • Conducted hands-on experiments to assess cryptographic system and hardware security
    • Used SASEBO for power consumption data capture and ChipWhisperer's software for analysis.
    • Collaborated with skilled team and participated in knowledge-sharing sessions.
    • Contributed to development of new security strategies and tools.
    • Contributed to development of new security strategies and tools.
    • Excited to apply gained knowledge to real-world hardware security challenges.

    Final Year Project

    2022

    MOODBOX (Sentimental Based Email Classifier)

    • A Web application developed in python-Flask that extract content of emails from email files and perform analysis on the body text using deep learning model, which was trained on publicly available dataset and tags emails as Fraudulent, harassing, Suspicious and Normal. Advance searching techniques such as search by sender, receiver, date, time and tag. PDF and HTML report can be downloaded once emails are classified. This tool support two file formats (eml and mbox). MOODBOX is very helpful in email forensic. In future direction many features can be added to expand our tool.

    Freelacing Project

    2022

    Data Security App

    • The purpose of this project was development of an application for enforcing corporate policies within an organization. Corporate policies are an essential aspect of an organization's security strategy, as they help to protect sensitive information, prevent unauthorized access, and ensure compliance with regulatory standards. However, the implementation and enforcement of corporate policies can be challenging, particularly in large organizations. I developed solution and covered user management and file management by ensuring the security aspect of data.

    Portfolio

    • All
    • App

    Areas of Intereset

    Take a look at some of the things I love working on.

    OSINT

    Using OSINT techniques, cyber security experts can identify assets with a public facing and map the information stored in each to identify potential cyber threats to an enterprise. Additionally, they assist cyber security teams in searching social media and other sources outside the firm for potential cyber risks.

    Web Pentest

    Web application penetration testing identifies potential real-world attacks on these systems. It pinpoints vulnerable points. Before an attacker does, web application pen testing finds flaws in apps or weak points in infrastructure. It helps in validating security guidelines.

    Threat Intelligence

    Threat intelligence, commonly referred to as cyber threat intelligence (CTI), is information obtained regarding ongoing or possible attacks against an organization from a variety of sources. The data is then refined, structured, and processed for analysis in order to reduce and mitigate cybersecurity threats.

    DevOps

    Applications themselves frequently carry security vulnerabilities. For the purpose of ensuring that applications are secure from the outset, an increasing number of businesses are including a security focus into the DevOps phase of their software development processes.

    NLP

    I have worked with researchers to apply NLP techniques to make sense of the motivations behind human interactions.

    Web Development

    I love creating the dynamic web applications. Development is not just about coding, It is Creativity, Art and Innovation.

    Testimonials

    He is a great resource. Fast, efficient, and detail-oriented. His communication was excellent throughout the entire process. In every way, it was a pleasure to work with him. He appears genuinely interested in learning about the client's problems.

    Muhammad Asim

    Python Developer & AI Engineer

    Ahmad is a superstar in the realm of technology and more specifically, has a broad skill set related to Threat Intelligence, OSINT, Python and Digital Forensics. I highly recommend Ahmad as a subject matter expert in mentioned domains.

    Hamza Ashraf

    OSINT Specialist & Threat Investigator

    Ahmed worked efficiently on the assigned projects, very good communication and contribution to improving the company's processes. Great individual to work with! Understood exactly what was wanted and delivered quickly.

    Numan Ellahi

    Pentester & Cyber Security Researcher

    Contact

    Get in touch via Email

    Location:

    Islamabad