Maximum upload file size: 3MB. File types allowed: jpg, jpeg, gif only.

Click the above 'Browse' button to select a photo.
Guidelines
  1. Only upload a photograph of yourself
  2. Photos of children, celebrities, pets, or illustrated cartoon characters will not be approved
  3. Photos containing nudity, gore, or hateful themes are not permissible and may lead to the cancellation of your account
  4. Photos of your passport, ID, or photos containing any personal information such as your address, passport number, or contact details are not permissible for your own security.

Delete Guidelines

Abdul Rasheed Baloch

Information Security Consultant/Specialist/Manager

Evamp & Saanga

Location:
Pakistan
Education:
Master's degree, Information security
Experience:
15 years, 0 months

Work Experience

What's your work experience? Your experience is one of the most important sections in a CV.
List all relevant responsibilities, skills, projects, and achievements against each role.  If you're a fresh grad, you can add any volunteer work or any internship you've done before.
Add Experience

Total Years of Experience:  15 Years, 0 Months   

April 2015 To Present

Information Security Consultant/Specialist/Manager

at Evamp & Saanga
Location : Pakistan - Islamabad
As an Information Security Specialist I have been assigned role of technical lead for Information Security, especially application security and security management. My responsibilities include but are not limited to:
 Develop, assess and verify application security requirements and architecture for critical business and financial applications, including but not limited to mobile financial services, telecom customer self-care applications, B2B and B2C portals etc.
 To conduct application security reviews to identify policy non-compliance and security vulnerabilities in change management
 To communicate the solutions for identified vulnerabilities to stakeholders as per defined policies and contractual requirements and support them to ensure that vulnerabilities are fixed in timely manner without affecting project deadlines
 To responsibly disclose application vulnerabilities in 3rd party functionality and provide support and Proof of Concept attacks to fix the vulnerabilities.
 To ensure that security is integrated into System Development Life Cycle (SDLC)
 To design and implement security solutions and controls recommended by compliance audits.
 To develop and maintain information security guidelines, standards, policies and procedures
 Develop and maintain information security trainings and ISO 27001 security standard compliance reporting
September 2011 To June 2015

Information Security Researcher

at National University of Science and Technology
Location : Pakistan - Islamabad
Computer Security
Advance Networks and Web Security
Wireless Networks Security
IT Laws and Computer Forensics
Information Security Management
Information Security Evaluation and auditing
Vulnerability Exploitation and Defense
Information Security Project Management
Cryptography
April 2010 To September 2012

Web Developer

at webhive
Location : Pakistan - Islamabad
Worked on a number of websites using:
Custom PHP
Content Management Systems e.g. Wordpress
MVC Frameworks such as Codeigniter
Various Shopping Cart Scripts such as Pinnacle Cart, Open Cart and a few Custom Carts
Different modules and routine based tasks.
Plug-in development, template/theme integration
Payment method integration, Ecommerce Sites customization (Frontend and database)
Search Engine Optimization
Testing and vulnerability assessment of web Applications and applying proper controls to fix the vulnerabilities.
January 2008 To January 2009

Web developer

at Gensoft
Location : Pakistan - Hyderabad
Dynamic HTML Web Pages
Cascaded Style Sheets
JavaScript validation in web forms
Website Content Management

Education

What's your educational background?
Let employers know more about your education; remember, be clear and concise.
July 2015

Master's degree, Information security

at National University of Science and Technology
Location : Pakistan
Information Security Assurance
Information Security Evaluation and auditing
Vulnerability Research and Exploitation
Penetration Testing
Risk Management
Source Code Auditing
Digital Forensics
Cryptography
Information Security Project Management
Wireless Network Security
December 2007

Bachelor's degree, Information Technology

at University of Sindh
Location : Pakistan - Hyderabad
Grade: 3.42 out of 4
During 4 years of Bachelor of Science in Information Technology a number of course were taught regarding Computer Software/Hardware and Programming, Applications of IT to business.

Specialties & Skills

Information Security

OWASP Application Security Methodlogies

Mobile Financial Solutions Security

Mobile Application Penetration Testing

Web Application Penetration Testing

Application Security Architecture

Information Security Management

Computer Security

Information Security Management

Vulnerability Management

Application Security

Security Monitoring

Languages

Do you speak more than one language?
For some jobs, fluency in one or more foreign languages is a plus, so add your language skills to get better results.

English

Expert

Training and Certifications

Computer Hacking Forensic Investigator ( Certificate )

Issued in: September 2014 Valid Until: - September 2017

Workshop on Information Security Tools and Techniques ( Certificate )

Issued in: October 2011 Valid Until: - October 2011

Workshop on Ethical Hacking ( Certificate )

Issued in: December 2009 Valid Until: - December 2009

Certified Ethical Hacker ( Certificate )

Issued in: August 2015 Valid Until: - August 2018

Loading
Loading...
Loading...