ARSLAN AKRAM

ARSLAN AKRAM

Internship in Pace Tech

Followers of ARSLAN AKRAM11000 followers
location of ARSLAN AKRAMIslāmābād, Pakistán

Connect with ARSLAN AKRAM to Send Message

Connect

Connect with ARSLAN AKRAM to Send Message

Connect
  • Timeline

  • About me

    Cyber Security Operations Manager | Information Security Expert & Researcher | Pentester | Certified Ethical Hacker v12 | Trend Micro Certified Professional | Threat Hunter | System Engineer | DevSecOps

  • Education

    • Punjab Group Of Colleges

      2014 - 2016
      F.SC pre ENGE Pre Engineering

      Study

    • Capital University of Science & Technology

      2016 - 2020
      BS Computer Science in Information Security & Forensics BSCS A (Gold Medalist)
    • Capital University of Science & Technology

      2020 - 2022
      MS Computer Science in Information Security And Forensics Grade: A
  • Experience

    • Pace Technologies

      Jul 2018 - Sept 2018
      Internship in Pace Tech

      Develop Company Require Websites and Web Apllication and also manage Data Records.

    • STUDENT OF CUST IN BSCS

      Mar 2019 - Mar 2020
      FYP

      just develop Advance Cafe POS System for clint as FYP. I developed a web-based cafe system backend using Node.js and develop business logic, database schema using MongoDB.

    • Cust

      Apr 2019 - Jun 2019
      Blood Donation Management System
    • Gold Lock

      Jul 2019 - Sept 2019
      Internship in Gold Lock

      Work In Defensive Security includes web site security, network security and endpoints security using SIEM Solutions and SSL Certificates Managment.

    • Self-employed

      Dec 2019 - Jan 2020
      Block Chain Development for Border Control System

      Semester Project

    • Tech Flickers

      Aug 2020 - Dec 2022
      Chief Technology Officer
    • Govt Job In Pakistn

      Oct 2021 - Nov 2024
      Cyber Security Operations Manager

      As a Cyber Security Operations Manager, my primary responsibility is to ensure the security of our organization through a robust defensive strategy. I firmly believe in the principle that "offense is the best defense," and I apply this mindset to achieve the highest level of protection. By taking a proactive approach, I focus on identifying vulnerabilities and weaknesses within our systems and networks. This allows me to implement effective defensive measures that shield our valuable assets from potential threats.In my role, I lead and manage a skilled team of professionals in various aspects of defensive security. Together, we work collaboratively to analyze security logs, investigate potential threats, and swiftly respond to any security incidents that may arise. By leveraging their expertise and coordinating their efforts, we ensure that our defensive security solutions, including EDR, SIEM, DLP, Threat Intel, and DNS Security, are optimized to their fullest potential.By integrating offensive strategies into our defensive approach, we adopt a proactive stance against potential threats. This means staying one step ahead by continuously identifying and addressing vulnerabilities before they can be exploited. Through our collective efforts, we maintain a strong security posture and provide a secure environment for our organization's critical resources.Overall, my primary objective as a Security Operations Manager is to establish and maintain a comprehensive defensive security strategy. By emphasizing a proactive mindset and utilizing a skilled team, we strive to achieve the highest level of protection for our organization. With our ongoing efforts, we ensure the safety and integrity of our valuable assets in an ever-evolving threat landscape. Show less

    • Capital University of Science & Technology

      Oct 2021 - Sept 2022
      Research Assistant

      My primary responsibility as a Research Assistant is to conduct research into various aspects of information/cyber security and to teach the practical ethical hacking and penetration testing courses at the University. Secondarily, I teach programing courses to students at different levels in languages like C++, Java, Python, Java Script, etc.

    • Ericsson

      Dec 2024 - now
      Information Security Expert

      As an Information Security Expert, I safeguard organizational assets using advanced cybersecurity strategies. I employ proactive and reactive measures to effectively detect, analyze, and mitigate threats. Key areas of focus include:Cyber Security Operations Management: Overseeing end-to-end cybersecurity operations to detect, respond to, and mitigate advanced threats. Leveraging a range of cutting-edge tools to ensure holistic threat coverage. Implementing proactive defense strategies complemented by threat-informed intelligence.Threat Detection & Incident Response: Conducting in-depth root cause analysis of security incidents to improve detection mechanisms and organizational resilience. Enhancing Incident Handling and Response Plans (IHRPs) to address and mitigate sophisticated threats effectively.Risk Management & Compliance: Designing and maintaining an information security risk register to address risks, issues, and actionable plans. Leading SOX and ISO27001 audits to ensure adherence to regulatory and industry standards.Tool Optimization & Process Efficiency: Improving the performance and efficiency of cybersecurity tools, including SIEM and other detection platforms. Developing and implementing process documentation, standards, and risk assessment procedures to close gaps and optimize security operations.Team Leadership & Development: Leading and mentoring cybersecurity teams to foster skill enhancement and a culture of continuous learning. Driving team capabilities to meet the challenges of advanced and evolving cyber threats.Next-Generation SOC Development: Advancing Security Operations Centers (SOC) by integrating advanced tools and methodologies for better threat detection, analysis, and mitigation.As a certified professional, I safeguard digital assets and empower teams using advanced tools and strategies, combining strategic insights with technical expertise to build secure and resilient environments. Show less

  • Licenses & Certifications

    • Certified in Cybersecurity

      (ISC)2
      Jan 2022
    • TrendMicro Threat Expert

      Trend Micro
      Jul 2022
    • Nmap

      BitGegree
      Sept 2019
      View certificate certificate
    • Splunk Infrastructure Overview

      Splunk
      Jul 2019
    • ISO/IEC 27001 INFORMATION SKILLFRONT SECURITY ASSOCIATE™

      SkillFront
      Jan 2022
    • Apex One Certified Professional

      Trend Micro
      Jan 2022
    • Splunk 7.x Fundamentals Part 1 (eLearning)

      Splunk
      Jul 2019
    • Hacking for Beginners: Guide on How to Break into a Remote System

      Learnoverse by BitDegree
      Feb 2020
    • Splunk User Behavior Analytics (eLearning)

      Splunk
      Jul 2019
    • Trend Micro Apex One (On-Premises) Technical Essentials

      Trend Micro
      Oct 2022