About
Cyber Security graduate with knowledge in a variety of cyber security components. Two years of experience in technical support. Energetic self-starter, problem-solver, and team player with outstanding technical, analytical, and communication skills. Fast learner with the ability to grasp new threats, concepts, and technologies.
OSINT Specialist | Threat Investigator | Pentester | Developer
Never stop learning, because life never stops teaching.
Core Skills:
- Operating Systems: Windows, Linux
- Languages: C++, Python, Javascript, HTML, CSS
- Pentest: OWASP ZAP, Burp Suite, FeroxBuster, DirBuster, Nmap, Metasploit, Sqlmap, Hydra, Wireshark, w3af, Manual Pentesting
- OSINT: Maltego, Google Dorks, The Harvester, Metagoofil, Recon-ng, Dark Web
- SOC: Monitoring, Vulnerability Assessment, QRadar (Basic)
The information security industry is on high alert due to a number of new and growing cybersecurity threats. The data and assets of businesses, governments, and individuals are always at risk due to more complex cyberattacks involving malware, phishing, machine learning and artificial intelligence, cryptocurrencies, and more.
Fun Facts
Cybersecurity involves more than just a computer screen or hidden hackers. Because cybersecurity is a necessity for everyone, it is one of the career categories with the greatest growth. Everything connected to our data and its safety falls under the category of cybersecurity.
Human error accounts for all data breaches.
The number of phishing attack victims increased in 2021, and remains the #1 type of cyber crime.
Employees who do not follow guidelines have become the top barrier to IT security.
By 2025, cybercrime is expected to cost the world.
Skills
I aim to attain challenging position in a reputable organization to expand and utilize my learning, skills and knowledge.
Resume
Sumary
Ahmed Faraz
Diligent cyber security specialist skilled in planning, implementing, and maintaining online security. Adept at instructing and educating internal users on necessary cyber security processes. Especially in professional and corporate contexts, focus on Threat Investigation, OSINT, and working to prevent cyberattacks.
- Islamabad
Education
Bachelor in Cyber Security
2018 - 2022
Air University, Islamabad
HSSC
2018
GOVT. Degree College, DG-Khan
Skills
Languages
C/C++
Python
Flask
Javascript
SQL
HTML
CSS
Cyber Security
Vulnerability scanning and assessment
Penetration testing techniques
Firewall management
Intrusion detection and prevention systems (IDS/IPS)
Incident response and management
Social engineering detection and mitigation
Proficiency in securing various OS
User access controls and permissions
Forensics analysis
Proficiency in secure coding practices
Developing custom security tools with Python
Cyber Security Tools
Prefered Interests
Work Experience
National Center For Cyber Security | Air University
November 2022 - December 2022
Research Assistant
- Developed and maintained Python-based mobile device forensics software.
- Collaborated with team of experts to enhance and optimize software tools.
- Stayed updated with mobile technology advancements and encryption mechanisms.
- Implemented data extraction algorithms for Android devices.
- Conducted rigorous testing, debugging, and quality assurance.
- Created technical documentation, including user guides and API documentation.
- Integrated software with cybersecurity tools and platforms.
- Participated in code reviews and suggested improvements to coding standards and practices
Internship at NECOP
May 2022 - August 2022
National Electronic of Pakistan, Islamabad
- Internship focused on hardware security, specializing in Power Analysis Attacks (PAA).
- Conducted hands-on experiments to assess cryptographic system and hardware security
- Used SASEBO for power consumption data capture and ChipWhisperer's software for analysis.
- Collaborated with skilled team and participated in knowledge-sharing sessions.
- Contributed to development of new security strategies and tools.
- Contributed to development of new security strategies and tools.
- Excited to apply gained knowledge to real-world hardware security challenges.
Final Year Project
2022
MOODBOX (Sentimental Based Email Classifier)
- A Web application developed in python-Flask that extract content of emails from email files and perform analysis on the body text using deep learning model, which was trained on publicly available dataset and tags emails as Fraudulent, harassing, Suspicious and Normal. Advance searching techniques such as search by sender, receiver, date, time and tag. PDF and HTML report can be downloaded once emails are classified. This tool support two file formats (eml and mbox). MOODBOX is very helpful in email forensic. In future direction many features can be added to expand our tool.
Freelacing Project
2022
Data Security App
- The purpose of this project was development of an application for enforcing corporate policies within an organization. Corporate policies are an essential aspect of an organization's security strategy, as they help to protect sensitive information, prevent unauthorized access, and ensure compliance with regulatory standards. However, the implementation and enforcement of corporate policies can be challenging, particularly in large organizations. I developed solution and covered user management and file management by ensuring the security aspect of data.
Areas of Intereset
Take a look at some of the things I love working on.
OSINT
Using OSINT techniques, cyber security experts can identify assets with a public facing and map the information stored in each to identify potential cyber threats to an enterprise. Additionally, they assist cyber security teams in searching social media and other sources outside the firm for potential cyber risks.
Web Pentest
Web application penetration testing identifies potential real-world attacks on these systems. It pinpoints vulnerable points. Before an attacker does, web application pen testing finds flaws in apps or weak points in infrastructure. It helps in validating security guidelines.
Threat Intelligence
Threat intelligence, commonly referred to as cyber threat intelligence (CTI), is information obtained regarding ongoing or possible attacks against an organization from a variety of sources. The data is then refined, structured, and processed for analysis in order to reduce and mitigate cybersecurity threats.
DevOps
Applications themselves frequently carry security vulnerabilities. For the purpose of ensuring that applications are secure from the outset, an increasing number of businesses are including a security focus into the DevOps phase of their software development processes.
NLP
I have worked with researchers to apply NLP techniques to make sense of the motivations behind human interactions.
Web Development
I love creating the dynamic web applications. Development is not just about coding, It is Creativity, Art and Innovation.
Testimonials
Contact
Get in touch via Email
Location:
Islamabad