Dewan M Zahid
214-***-**** *********@*****.*** https://zahidewan.github.io
**** ***** ***, *******, ** 56001
EDUCATION
Minnesota State University, Mankato, MN May 2018
Bachelor of Science, Computer Information Technology Minor: Technical Communication
TECHNICAL SKILLS
Security & Networking:
Network Security–IDS/IPS, Identity & Access Management, Data Security, Firewall, WAF, Proxies, DDoS, Cloud Security, Advanced Wireshark
Ethical Hacking & pen testing: Metasploit, Nessus, Burp Suite Pro, ZAP (OWASP Top 10), Incident Response–SIEM, Splunk, LogRhythm, Syslog; Scripting–Bash, AWK, Python, Batch, Sql
Forensic Imaging, Data leak prevention, Risk Management, Security Research, Office365 ATP, MS ATA Programming Languages: Java, Python, PL/SQL
Web Application & UI: Full-stack web development(JavaScript), Prototyping DBA, QA & Testing: PL/SQL, MSsql, Server 2016, System & Unit Testing, Test Automation & Data Analysis, System Analysis, Create & Execute End to End Test Plans Technical Tools & OS Platform: Microsoft Project, Usability Testing, Desktop Publishing, Technical Writings & Editing, LaTeX; Linux: Ubuntu, Debian, Kali, OpenSSH; MacOS, Windows 10 & Server 2016 PROFESSIONAL EXPERIENCES
Information & Technology Services, Minnesota State University, Mankato MN Aug 2016 – Present Information Security Lead Analyst Intern, Dec 2017 – Present
• Analyze security alerts/incidents and tickets for malicious traffic and events on the network
• Perform initial incident investigation/response at the request of CISO
• Manage a group of five security analysts to provide excellent service & assist CISO
• Evaluate web application firewall(WAF) configurations
• Utilize strong TCP/IP networking skills to isolate and diagnose network issues
• Perform risk assessments to help create optimal prevention and management plans
• Perform & Investigate Forensic Imaging
• Identify & evaluate potential threats and vulnerabilities
• Preform pen-testing in existing web applications and report to DevOps team
• Execute vulnerability scans of all Information Technology assets
• Ensure secure disposal and destruction of data
• Monitor and analyze firewall logs to ensure any risks are responded to immediately
• Make recommendations for mitigating identified risks Dewan M Zahid
Information Security Analyst Intern, Dec 2016 – Dec 2017
• Monitored firewall logs to ensure any risks are responded to immediately
• Modified existing bash scripts to automate daily tasks and respond to incidents immediately
• Assisted in improving security awareness on campus through active campaigns and interactive training.
• Performed hands-on HIPAA Risk Assessment with aid of supervisor to ensure new dental building at the university met HIPAA Compliance Standards.
• Worked with web development team to investigate security vulnerabilities
• Performed patching, EMS Heat Agent, Forensic Imaging, Web Application Pen-testing
• Executed routine automated vulnerability scans of all Information Technology assets.
• Communicated daily basis with system administrators to ensure student data integrity when completing a DMCA, SOC, Malware and Phishing tickets.
IT Solutions Service Desk Consultant, Aug 2016 – Dec 2016
• Resolved any technical issues over the phone, and/or in person for Faculty, Staff & Students
• Troubleshooting printers, network connectivity, operating systems
• Assisted in Lab deployment with required software and application configurations ACTIVITIES
• CCDC– Collegiate Cyber Defense Competition 2018 (BLUE TEAM) PROJECTS
• Microsoft Advanced Threat Analytics –ATA, Office365 –ATP, Windows Defender Advanced Threat Protection–WDATP
• Summer Patching Deployment–EMS Heat Agent (3000 machines)
• HIPAA compliance (Written Policy) for MSU Dental
• Network Automation–Using Python Scripts
• Network Design Proposal
• Scenery Generator–Vulnerable VMs generator (Dr. Z Cliffe)
• Lab Simulation –Worked on Kali Linux OS to infiltrate an actual system over the course of a full semester
• Security Strategies–Created and shared a presentation on security strategies to demonstrate knowledge of security threats in a business forum