Faheem Shehzad

Faheem Shehzad

Computer Networks Intern

Followers of Faheem Shehzad5000 followers
location of Faheem ShehzadPakistan

Connect with Faheem Shehzad to Send Message

Connect

Connect with Faheem Shehzad to Send Message

Connect
  • Timeline

  • About me

    SOC L2 | MS Information Security | CySA+ | SC-200

  • Education

    • University of Engineering and Technology, Taxila

      2016 - 2020
      Bachelor of Computer Science Computer Software Engineering
    • National University of Sciences and Technology (NUST)

      2020 - 2022
      MS Information Security Information Technology
  • Experience

    • Army Welfare Trust

      Oct 2020 - Jun 2021
      Computer Networks Intern

      Monitoring network engineering performance and ensure system availability and reliabilityConfiguring and installing various network devices and services (e.g., routers, switches, firewalls, load balancers, VPN, QoS)Performing network maintenance and system upgrades including service packs, patches, hot fixes and security configurations

    • Trillium Information Security Systems

      Jun 2021 - Sept 2021
      Information Security Trainee

      Identifying security vulnerabilities in websites, networks, or operating systemsReviewing any relevant information about previous attacks to determine the best way to respond to new threatsBuilding and testing prototypes of new security measures to prevent future attacksAnalyzing potential security risks and developing solutions to prevent hacking attacksResearching new types of malware to help create detection methods for new threatsDeveloping anti-virus software programs to identify and remove viruses from infected computersConducting forensic analysis on computers to recover data from damaged hard drivesDocumenting findings about malware infections for future reference Show less

    • Pakistan Air Force

      Oct 2021 - Sept 2022
      Security Operations Center Analyst

      Hands on SIEM (Security Information and Event Management)Hands on EDR (Endpoint Detection and Response)Hands on Threat Intelligence Applications Implement and manage security toolsInvestigate suspicious activities, contain and prevent themReduce downtime and ensure business continuityProviding security services to the rest of the organizationAudit and compliance supportTCP/IP, computer networking, routing, and switchingIDS/IPS, penetration and vulnerability testingFirewall and intrusion detection/prevention protocolsWindows, UNIX, and Linux operating systemsNetwork protocols and packet analysis toolsAnti-virus and anti-malware Show less

    • Rewterz

      Nov 2022 - Mar 2023
      Information Security Analyst L2

      Monitor computer networks for security issues.Investigate security breaches and other cybersecurity incidents.Install security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs.Document security breaches and assess the damage they cause.Work with the security team to perform tests and uncover network vulnerabilities.Fix detected vulnerabilities to maintain a high-security standard.Stay current on IT security trends and news.Develop company-wide best practices for IT security.Perform penetration testingHands on SIEM (Security Information and Event Management)Hands on EDR (Endpoint Detection and Response)Hands on Threat Intelligence Applications Implement and manage security toolsInvestigate suspicious activities, contain and prevent themReduce downtime and ensure business continuityProviding security services to the rest of the organizationAudit and compliance supportTCP/IP, computer networking, routing, and switchingIDS/IPS, penetration and vulnerability testingFirewall and intrusion detection/prevention protocolsWindows, UNIX, and Linux operating systemsNetwork protocols and packet analysis toolsAnti-virus and anti-malware Show less

    • YOTTABYTE

      Mar 2023 - now
      Security Operations Centre Analyst L2

      Monitor security alerts and events in real-time from various security systems, including SIEM, IDS/IPS, EDRInvestigate security incidents, conduct in-depth analysis, and perform root cause analysis to determine the scope and impact of security events.Cyber incident triage, response, and investigations based on alerts received from multiple sources.Respond to security incidents promptly, following established incident response procedures, and mitigate the impact of security threats.Develop and maintain documentation, reports, and metrics related to security incidents, investigations, and mitigation efforts.Analyze network traffic and logs to identify patterns, anomalies, and potential security breaches.Analyze user reported security incidents, anomalous behavior and phishing emails for threat hunting, security control fine-tuning and blocking IOCs.Collaborate with IT and cyber security teams to perform threat analysis and propose suitable response and mitigation activities.Collect threat intelligence feeds from multiple sources and disseminate to relevant stakeholders along with recommendations.Utilize threat intelligence feeds to identify and respond to emerging cyber threats and vulnerabilities in IT systems.Create and maintain regular operational reports for management.Perform any other relevant tasks assigned by the management Show less

    • Calian IT & Cyber Solutions

      Mar 2023 - now
      Security Operations Center Analyst L2

      Monitor security alerts and events in real-time from various security systems, including SIEM, IDS/IPS, EDRInvestigate security incidents, conduct in-depth analysis, and perform root cause analysis to determine the scope and impact of security events.Cyber incident triage, response, and investigations based on alerts received from multiple sources.Respond to security incidents promptly, following established incident response procedures, and mitigate the impact of security threats.Develop and maintain documentation, reports, and metrics related to security incidents, investigations, and mitigation efforts.Analyze network traffic and logs to identify patterns, anomalies, and potential security breaches.Analyze user reported security incidents, anomalous behavior and phishing emails for threat hunting, security control fine-tuning and blocking IOCs.Collaborate with IT and cyber security teams to perform threat analysis and propose suitable response and mitigation activities.Collect threat intelligence feeds from multiple sources and disseminate to relevant stakeholders along with recommendations.Utilize threat intelligence feeds to identify and respond to emerging cyber threats and vulnerabilities in IT systems.Create and maintain regular operational reports for management.Perform any other relevant tasks assigned by the management Show less

  • Licenses & Certifications

    • Microsoft Certified Security Operations Analyst Associate (SC-200)

      Microsoft
      Sept 2024
    • CompTIA Cybersecurity Analyst (CySA+)

      CompTIA
      Jan 2025
      View certificate certificate
    • Data Analytics Fundamentals

      Amazon Web Services (AWS)
      Jun 2020
      View certificate certificate
    • Certified Network Security Specialist

      ICSI (International CyberSecurity Institute), UK