Cassim Ahmed Attia, Freelance Penetration Testing (Remote)

Cassim Ahmed Attia

Freelance Penetration Testing (Remote)

The Intelligent Thinker

Location
Pakistan - Karachi
Education
Master's degree, Islamic Banking and Finance
Experience
9 years, 6 Months

Share My Profile

Block User


Work Experience

Total years of experience :9 years, 6 Months

Freelance Penetration Testing (Remote) at The Intelligent Thinker
  • Pakistan - Karachi
  • My current job since March 2016

Penetration Tester:

Perform tests on applications, network devices, and cloud infrastructures
Design and conduct simulated social engineering attacks
Research and experiment with different types of attacks
Develop methodologies for penetration testing
Review code for security vulnerabilities
Reverse engineer malware or spam
Document security and compliance issues
Automate common testing techniques to improve efficiency
Write technical and executive reports
Communicate findings to both technical staff and executive leadership
Validate security improvements with additional testing

Network and app. security
Programming lang., especially for scripting (Python, BASH, PHP, JavaScript, Ruby, Perl)
Threat modeling
Linux, Windows, and MacOS environments
Security assessment tools
Pent. management platforms
Technical Writing and Documentation
Cryptography
Cloud Architecture
Remote Access Tech.

Coding for Infiltrate any Sys.
Comprehension of Comp. Security including Forensics, Sys. Analysis and much more
Insight into how hackers exploit the element to gain unauthorized access to secure systems
Clear to understanding of how computer security breaches and disturbance of business including to the financial and managerial implications
Exceptional problem-solving
Document development and share findings information

Business and Management
Technical Writing
Network & Security Admin
Network Engineer
Focus on Security & Expand Education

Opaque, Semi-opaque and Transparent box
External & Internal, Blind, Double-blind and Testing

Conducts tests on apps and networks
Assesses Physical Security
Conducts Security Audits
Analyzes Security Policies
Writing Security Assessment Reports

Knowledge of Computer Networks (Link, Network, Transport and Application Layer Protocols)
Understanding of different network components
Familiarity with Exploits and Vulnerabilities outside of tool suites
Willingness to Continually Learn about what is overcome
Knowledge of Web Communications and Security Technologies

Cyber Defense Incident Responder:

SIEM tools and manage reports
There tools are:

Splunk
Kibana
Wazuh


IT Audit Specialist:

IT GRC
IT GRE
CISA
CRIC
CGET
CISM

System Operations:

Linux System Administration and application management Level1 and Level2

Manage Storage
Manage LVM
Manage Business Application
Manage Business Critical Application
Manage Technologies
On prime to Cloud when business customer wants
SAN
NAS
Fiber channel for data transport
iscsi for connect data transport
scsi for data transport
Data Migration
OS Hardening
Support and Manage Databases

DNS Servers Management
Apache Servers Management
FTP Servers Management
NFS Servers Management
Samba Servers Management
Setup Application Firewalls

Servers develop on VM, Hypervisor, Esxi, vsphere, vCenter, Docker, Kuburnaties and Cloud

Essentially used CentOS and Fedora and Ubuntu if Business critical Applications so used RedHat and Suse Linux and also managed Window Servers

On cloud using AWS

Cyber and Information Security Specialist (Remote) at Al-Nafi Cloud
  • Pakistan - Karachi
  • My current job since March 2022

● Settings and implementing user access controls and identify and access management systems.
● Monitoring network and application performance to identify irregular activity.
● Performing regular audits to ensure security practices are compliant.
● Deploying endpoint detection and prevention tools to thwart malicious hacks.
● Setting patch management systems to update applications automatically.
● Implementing comprehensive vulnerability management systems across all assets on-premises and in the cloud.
● Working with IT operations to set up a shared disaster recovery business continuity plan.
● Working with HR and the team leads to educating employees on how to identify suspicious activity.
● Collaborate with IT infrastructure, Application teams, and business security leaders to define and gather Analytics requirements.
● Understand the company’s IT Infrastructure, Applications, Business model, processes, and Security controls and develop Threat Detection Models within the Behavior Analytics platform.
● Coordinate and perform security testing activities (penetration testing, vulnerability scanning, application security testing), report on results, track metrics & trends, and drive remediation.
● Managing and performing on teams that conduct analyses related to forensic investigations, cybercrime, or cyberattacks and supporting various and dynamic security analysis needs of the group.
● Analyzing security logs, monitoring logs, firewall logs, intrusion prevention system logs, and network- and core-related logs.
● Analyzing and developing baselines for all related risks from Security Analytics and other log management tools, emphasizing security analysis of critical system logs and network protocols.
● Managing analyses of logs, traffic flows, etc. to identify malicious activity, designing rules that trigger response to malicious activity, analyzing the findings on malicious activity and preparing reports; developing response procedures for addressing potential security threats and driving the onboarding of new logs into Security Analytics.
● Conducting analyses of evidence of network penetrations and data theft using firewalls, active directories, Windows operating systems, intrusion detection/prevention systems, proxy servers, breach indicators, and log aggregation technology.
● Conduct vulnerability and risk assessment on Information Systems to ensure they comply with security standards and measures utilizing Assured Compliance Assessment Solution (ACAS) and Nessus Scanner.
● Hands-on troubleshooting, analysis, and technical expertise to resolve incidents and service requests previous experience in troubleshooting day-to-day operational processes such as security monitoring, data correlation, and security operations.
● Comfortable in performing Technical Vulnerability Assessment and Penetration Testing in OT environment with tool-based and manual methods.
● Conducting ICS/OT site assessments to identify business-critical systems and develop effective risk mitigation measures.
● Building and developing long-term relationships with all stakeholders internally and with clients.
● Hands-on skills with Wazuh (SIEM and FIM), Nessus (Vulnerability management), Open Audit (Asset Management), NGINX (Web application Firewall), Metasploit, security onion, and OSSEC tools.

Cyber and Information Data Security Analyst (Remote) at Al-Nafi Cloud
  • Pakistan - Karachi
  • June 2020 to March 2023

● Settings and implementing user access controls and identify and access management systems.
● Monitoring network and application performance to identify irregular activity.
● Performing regular audits to ensure security practices are compliant.
● Deploying endpoint detection and prevention tools to thwart malicious hacks.
● Setting patch management systems to update applications automatically.
● Implementing comprehensive vulnerability management systems across all assets on-premises and in the cloud.
● Working with IT operations to set up a shared disaster recovery business continuity plan.
● Working with HR and the team leads to educating employees on how to identify suspicious activity.
● Collaborate with IT infrastructure, Application teams, and business security leaders to define and gather Analytics requirements.
● Understand the company’s IT Infrastructure, Applications, Business model, processes, and Security controls and develop Threat Detection Models within the Behavior Analytics platform.
● Coordinate and perform security testing activities (penetration testing, vulnerability scanning, application security testing), report on results, track metrics & trends, and drive remediation.
● Managing and performing on teams that conduct analyses related to forensic investigations, cybercrime, or cyberattacks and supporting various and dynamic security analysis needs of the group.
● Analyzing security logs, monitoring logs, firewall logs, intrusion prevention system logs, and network- and core-related logs.
● Analyzing and developing baselines for all related risks from Security Analytics and other log management tools, emphasizing security analysis of critical system logs and network protocols.
● Managing analyses of logs, traffic flows, etc. to identify malicious activity, designing rules that trigger response to malicious activity, analyzing the findings on malicious activity and preparing reports; developing response procedures for addressing potential security threats and driving the onboarding of new logs into Security Analytics.
● Conducting analyses of evidence of network penetrations and data theft using firewalls, active directories, Windows operating systems, intrusion detection/prevention systems, proxy servers, breach indicators, and log aggregation technology.
● Conduct vulnerability and risk assessment on Information Systems to ensure they comply with security standards and measures utilizing Assured Compliance Assessment Solution (ACAS) and Nessus Scanner.
● Hands-on troubleshooting, analysis, and technical expertise to resolve incidents and service requests previous experience in troubleshooting day-to-day operational processes such as security monitoring, data correlation, and security operations.
● Comfortable in performing Technical Vulnerability Assessment and Penetration Testing in OT environment with tool-based and manual methods.
● Conducting ICS/OT site assessments to identify business-critical systems and develop effective risk mitigation measures.
● Building and developing long-term relationships with all stakeholders internally and with clients.
● Hands-on skills with Wazuh (SIEM and FIM), Nessus (Vulnerability management), Open Audit (Asset Management), NGINX (Web application Firewall), Metasploit, security onion, and OSSEC tools.

Cyber and Information Data Security Intern (Remote) at Al-Nafi Cloud
  • Pakistan - Karachi
  • March 2021 to June 2021

What is Cyber and Information Data Security?
What are the Standards of Cyber and Information Data Security?
What are the Frameworks of Cyber and Information Data Security?
How many Teams are in the Cyber and Information Data Security?
What is Cyber and Information Data Security Audit?
What is RedTeam?
Who are Hacker?
How many types of Hacker?
What is Penetration/Pentester/Offensive Security Tester?
What is Cyber and Information Attack?
What is Threat?
What is Malware?
What is Vulnerability?
How to Assessment in Organization?

What is BlueTeam?
What is Cyber and Information Data Security Defense?
How the Defense Center Works?
What is the Defense Center?

Who are GreenHat?
Who are YellowHat?
Who are RedHat?
Who are BlueHat?
Who are OrangeHat?
Who are PurpleHat?

Junior SEO (Remote) at Mindqua
  • Pakistan - Karachi
  • May 2020 to October 2020

Blog comment, Business Profiles, User Profiles, Guest Postings, Articles Submissions, Web 2.0, Directories Submissions, Forums Postings, Business Listings and Press Releases
Rank their customers website
Keywords optimizer and SEO page Ranking

Junior SEO at Grand Insight
  • Pakistan - Karachi
  • January 2019 to March 2020

Blog comment, Business Profiles, User Profiles, Guest Postings, Articles Submissions, Web 2.0, Directories Submissions, Forums Postings, Business Listings and Press Releases
Rank their customers website
Keywords optimizer and SEO page Ranking

Junior Web Developer at Zero(Super)Soft Technologies
  • Pakistan - Karachi
  • June 2014 to May 2015

Develop Back-End and Front-End Web Application using PHP with using Object Oriented Programming
Develop and Maintain E-Commerce Website
Manage Databases using SQL Queries
Develop best for the scripting for business optimized with auto management
Build UX/UI by using HTML &+5, JavaScript and CSS &+ 3 and also using Pre-Built libraries like BootStrape

Complete full-stack open-source E-commerce web development using on HTML &+ 5, CSS &+ 3, JavaScript, jQuery, Ajax, AngularJS, Bootstrap, MYSQL, PHP and also Android E-Commerce application and also open-source Content Management System which is WordPress, Joomla etc and marketing project also for sales our services to the customers

Junior Application Marketing at Zero(Super)Soft Technologies
  • Pakistan - Karachi
  • March 2015 to May 2015

Social Media Marketing Camping for Business Development
Entertain Customers
Business Development
Maintain Business Rank
Customer Quotations
Development Team Guider

Client Service Internship at Rotary Club of Karachi (RCK)
  • Pakistan - Karachi
  • July 2013 to September 2013

Entertain Customer for Business
Maintain and Manage Book-Keeping
Develop Presentation
Develop Documentation about the Business

Education

Master's degree, Islamic Banking and Finance
  • at University Of Karachi
  • December 2020

Al-Quran WA Uloom Ul Quran - 1 Al-Hadith Wa Uloom Ul Hadith - 1 Law of Contract in Islam - 1 Islamic Economic & Finance - 1 Arabic for Understanding of Quran & Hadith - 1 Al-Quran WA Uloom Ul Quran - 2 Al-Hadith Wa Uloom Ul Hadith - 2 Law of Contract in Islam - 2 Islamic Economic & Finance - 2 Arabic for Understanding of Quran & Hadith - 2 Principles of Islamic Jurisprudence & Utehad Communication Skills Principles of Accounting Islamic Concept of Securities, Mutual Funds & Insurance Management Information System (MIS) for Banking & Finance Islamic Banking Operations Statistics Financial Accounting Shariah Audit & Compliance AAOIFI (Accounting and Auditing Organization for Islamic Financial Institutions) Shariah & Accounting Standards

Bachelor's degree, Business Administration And Commerce
  • at University of Karachi
  • December 2016

Islamic Studies Pakistan Studies Functional English Introduction to Business Principles of Accounting Statistics & Business Maths Economics Analysis & Policy Business Communication Principles of Management Economics Developement of Pakistan Advanced Accounting Cost Accounting Business & Industrial Law Auditing & Income Tax Law Urdu

High school or equivalent, Commerce
  • at Board of Intermediate Karachi
  • September 2014

Urdu Normal 1 & 2 English Normal 1 & 2 Islamic Education 1 Pakistan Studies 2 Principle of Accounting 1 & 2 Principle of Commerce and Banking 1 & 2 Commercial Geography 2 Principle of Economics 1 Business Mathematics (Mathematics / Statistics) 1 & 2

High school or equivalent, Computer Science
  • at Board of Secondary Education Karachi
  • June 2012

Sindhi Salees Urdu Normal English (Compulsory) Paper I & II Pakistan Studies Islamiat Mathematics Computer Studies (Theory + Practical) Physics (Theory + Practical) Chemistry (Theory + Practical)

Specialties & Skills

Cloud Computing
Cyber Security
Linux System Administration
NIST Standards
JavaScript
Microsoft Project
System Administration
Software
Security
Encryption
HTML&+5
Ruby Programming
Hardware
Microsoft Word
Network Security
Authentication
PCI DSS
Microsoft PowerPoint
Microsoft Excel
Microsoft Access
Network Monitoring
Social Networking
Information Assurance
Microsoft Outlook
Firewalls
PC Networking
Computer Hardware Troubleshooting
Network Operations
Routers
Network Engineering
Windows

Languages

Arabic
Beginner
English
Native Speaker
Urdu
Expert
Hindi
Expert

Memberships

Al-Nafi
  • Cyber Security Analyst
  • March 2021

Training and Certifications

Cyber and Information Security Professional (Training)
Training Institute:
Al-Nafi
Date Attended:
March 2021
Duration:
1000 hours

Hobbies

  • Hiking
  • Self Research Thinking on Thoughts
  • Watching Movies
  • Reciting 99 Names of Allah
  • Hardware Working
  • Gardening