M. Ali

M. Ali

Development Intern

Followers of M. Ali2000 followers
location of M. AliIslamabad, Islāmābād, Pakistan

Connect with M. Ali to Send Message

Connect

Connect with M. Ali to Send Message

Connect
  • Timeline

  • About me

    SOC Manager | Cloud Security Architect | Cybersecurity Service Delivery Architect | CEH | CISM | AWS certified security expert

  • Education

    • Riphah International University

      2017 - 2019
      Master's degree Computer and Information Systems Security/Information Assurance 3.47
    • Riphah International University

      2012 - 2016
      Bachelor’s Degree Computer Software Engineering
  • Experience

    • DPL

      Jun 2016 - Aug 2016
      Development Intern

      • Researched cybersecurity trends and emerging threats to generate relevant content ideas.⠀• Worked with security analysts and writers to ensure technical accuracy in content titles.⠀• Applied basic SEO strategies to improve content visibility in cybersecurity-related searches.• Helped refine security-related content for clarity, accuracy, and engagement.

    • Digital Research Labs (PVT) Ltd.

      Feb 2017 - Jan 2018
      System Administrator

      • Developed and maintained plans, ensuring critical data and systems were protected and could be quickly restored in the event of a breach or disaster.⠀• Managed regular security risk assessments and vulnerability scanning programs, ensuring that identified risks were prioritized and mitigated timely.⠀• Collaborated with development teams to integrate security practices into the software development lifecycle (SDLC), including threat modeling, code reviews, and static analysis.• Managed third-party vendor risk assessments, ensuring that external partners adhered to the organization’s cybersecurity policies and contractual security requirements.⠀• Developed and tracked cybersecurity performance metrics, providing senior leadership with insights into risk trends, security posture, and key vulnerabilities. Show less

    • SOFIT Consultancy (Private) Limited

      Feb 2018 - Sept 2019
      Security Administrator

      • Designed and implemented advanced security architectures for both on-premise and cloud-based infrastructures, ensuring scalability, performance, and resilience against evolving threats.⠀• Optimized SIEM platforms, enhancing correlation rules, data normalization, and incident prioritization to improve the effectiveness of security event monitoring and reporting.⠀• Implemented network segmentation strategies and deployed network security controls such as firewalls, IDS/IPS, and VPNs, ensuring effective protection of sensitive data and systems.⠀• Proactively conducted threat hunting activities, analyzing network traffic, logs, and endpoint data to identify emerging threats and indicators of compromise (IOCs). Show less

    • Tech Avenue Pvt Ltd

      Oct 2019 - Jun 2022

      • Developed and implemented security solutions in line with organizational strategies to enhance overall cybersecurity posture and threat resilience.⠀• Led the adoption of a Zero Trust security model for clients, enforcing strict access controls and identity verification to safeguard critical systems and sensitive data.⠀• Deployed Kaspersky EDR across 300+ air-gapped endpoints, significantly improving endpoint security and reducing risk exposure.⠀• Conducted interactive cybersecurity awareness training sessions for employees, improving knowledge on threat prevention and security best practices.⠀•Led the design of scalable and resilient security architectures, incorporating advanced threat detection, identity management, and encryption technologies.⠀• Partnered with IT, DevOps, and legal teams to align cybersecurity measures with business objectives and regulatory requirements.⠀•Assessed, integrated, and optimized security tools (SIEM, EDR, IDS/IPS, etc.) to enhance threat detection, incident response, and compliance reporting. Show less • Managed the vulnerability management lifecycle, identifying, assessing, and remediating critical vulnerabilities in enterprise systems to prevent exploitation.⠀• Designed and implemented robust security protocols to protect client cloud environments, ensuring data security, regulatory compliance, and continuous threat monitoring.⠀• Worked with cross-functional teams to design and implement secure network and system architectures, ensuring strong protection across enterprise environments.⠀• Integrated advanced threat detection tools, including SIEM and EDR systems, improving real-time monitoring and threat identification capabilities.⠀• Supported the implementation of compliance standards (e.g., GDPR, NIST) to ensure adherence to industry regulations and mitigate organizational risk.⠀• Collaborated with government agencies to ensure the implementation of best-in-class cybersecurity measures tailored to specific operational needs. Show less

      • Security Engineer

        Sept 2021 - Jun 2022
      • SOC Engineer

        Oct 2019 - Sept 2021
    • XFlow Research Inc.

      Jun 2022 - May 2023
      Staff Engineer

      • Led research and development initiatives to design and implement advanced security solutions, addressing emerging threats and vulnerabilities.⠀• Developed and enforced comprehensive cybersecurity policies aligned with industry standards to mitigate risks and strengthen security posture.⠀• Designed and deployed a high-performing Security Operations Center (SOC), enhancing security monitoring, incident detection, and response capabilities.⠀• Led the design of scalable and resilient security architectures, incorporating advanced threat detection, identity management, and encryption technologies.⠀• Ensured adherence to industry regulations (GDPR, HIPAA, etc.), driving continuous risk assessments and mitigation strategies.⠀• Partnered with IT, DevOps, and legal teams to align cybersecurity measures with business objectives and regulatory requirements. Show less

    • Cloudelligent

      May 2023 - now
      Information Technology Security Analyst

      • Directed the successful implementation and ongoing management of SOC2 compliance, ensuring adherence to regulatory standards and security controls.⠀• Managed the Managed Security Service Provider (MSSP) program as product owner, overseeing vendor relations, service delivery, and performance monitoring against SLAs.⠀• Created and enforced comprehensive cybersecurity policies, addressing risk management, access controls, and incident response protocols.⠀• Managed risk assessments, tracked key compliance metrics, and led risk mitigation efforts in line with corporate governance and regulatory frameworks.⠀• Designed and implemented cloud security frameworks to safeguard public, private, and hybrid cloud environments, focusing on compliance and risk mitigation.⠀• Developed and rolled out security awareness programs, reducing human errors by educating employees on threat identification and best security practices.⠀• Oversaw the integration of threat intelligence feeds, improving threat detection and response, while managing vulnerability assessments and remediation efforts.⠀• Refined incident response processes and business continuity planning to ensure quick recovery and minimal downtime during security breaches.⠀• Designed and executed DLP strategies, enforcing policies to prevent unauthorized data access, loss, and exfiltration.⠀• Collaborated with IT teams to integrate security measures into network and system architecture, ensuring a resilient and secure infrastructure. Show less

    • Telenor

      Mar 2024 - now
      Manager Security Operation Center (SOC)

      • Directed and coordinated SOC functions, ensuring prompt identification, analysis, communication, and resolution of security incidents, driving a proactive security posture.⠀• Spearheaded incident response efforts, including swift identification, assessment, escalation, and containment, minimizing business impact and improving response time.⠀• Oversaw and mentored SOC team members, fostering a collaborative work environment, while managing third-party vendors to ensure optimal service delivery and resource utilization.⠀• Designed and delivered executive-level reports, dashboards, and metrics for cybersecurity operations, providing actionable insights to senior leadership for decision-making.⠀• Worked closely with internal and external stakeholders to establish and maintain strong relationships, enhancing cross-functional communication and coordination.⠀• Managed a comprehensive suite of cybersecurity tools, including SIEM, Incident Response platforms, Vulnerability Management systems, Endpoint Security, Web Security Gateways, Threat Intelligence platforms, IAM, and PAM systems, ensuring seamless integration and optimal performance.⠀• Drove continuous improvement initiatives in SOC processes, focusing on automation, threat detection capabilities, and overall system efficiency.⠀• Ensured compliance with industry regulations and best practices by maintaining effective risk management protocols, conducting regular audits, and implementing security enhancements. Show less

  • Licenses & Certifications

    • Certified Professional: Kaspersky Endpoint Security and Management

      Kaspersky
      Aug 2021
    • Certified Information Systems Security Professional (CISSP)

      ISC2
    • Certified Information Security Manager (CISM)

      ISACA
      Jan 2023
      View certificate certificate
    • AWS Certified Security Specialty

      Amazon Web Services (AWS)
      Feb 2024
      View certificate certificate
    • AWS Certified Cloud Practitioner

      Amazon Web Services (AWS)
      Aug 2023
      View certificate certificate
    • Certified Ethical Hacker (CEH)

      EC-Council
      Dec 2019
      View certificate certificate