Abdul Hadi
Penetration Tester / Cyber Security Analyst
********@*****.*** MS (IT) MBA (Marketing) B.E (IT & Electronics)
Professional Summary:
Over 14+ years of diversified IT experience in various security, architecture, networking, and project management positions. Proven and extensive hands-on experience designing, engineering, and maintaining enterprise level security architectures for Fortune 500 companies. Strong background in vulnerability assessments, penetration testing, industry/government compliance, LAN/WAN design, integration, administration, and security. Maintains outstanding interpersonal skills and the ability to work effectively with all levels of technical staff and clients.
More than 4+ years of experience in Web Application Security, Logging and Alerting, Security Design, Penetration Testing, Secure Coding, Mobile Application Security, Application Security Controls and Validation, Risk Assessments, Regulatory Compliance and Secure Software Development Life Cycle (secure SDLC).
Knowledge encompasses many product areas and technologies including QRadar, FireEye, RSA, Check Point, Palo Alto Networks, Websense, Cisco ASA, Nessus, NMAP, Metasploit, Nexpose, Virtual Private Networks (VPN/SSLVPN), Cisco Routing and Switching, Wireless Technologies, Active Directory, PCI DSS, NIST 800 - xx, FERC, NERC, Quest Intrust, Quest Active Roles Server, Quest Archive Manager, Linux/Unix, SQL Database Programming and Administration, OS Scripting, and Multiple Programming Languages
Hands - on experience in developing threat models, security controls, threat analysis, creation of risk control matrices and risk mitigation strategies.
Hands-on with Penetration Testing, DAST, SAST and manual ethical hacking.
Experience in conducting IT Security Risk Assessments in accordance to NIST and FFIEC framework.
Experience in vulnerability assessment and penetration testing using various tools like Burp Suite, Dir-Buster, OWASP ZAP proxy, Accunetix, NMAP, Nessus, Nikto, web scanner, w3af, HP Fortify, IBM App Scan enterprise, Kali Linux.
Work with global security teams performing application and IT infrastructure security assessments.
In-depth knowledge of penetration testing for web and mobile (iOS and Android) applications.
Have a good understanding of Web Application based attacks to include Denial-of-service attacks, MITM attacks, Local file inclusion (LFI), Remote file inclusion(RFI) and Buffer overflow.
Performed security design and architecture reviews for web and mobile applications.
Working knowledge of AWS Cloud Security in implementing Web Application Firewalls (WAF).
Hands on Experience working with LAN and WAN topologies, TCP/IP protocol, routers, switches, and firewalls in Internet, Intranet and Extranet environments.
Security assessment based on OSSTMM methodology and OWASP framework.
Worked with Cloud compliant and web application security using Qualys Guard.
Excellent scripting and debugging skills on JavaScript, Python Scripting, Php and Ruby.
Working knowledge of OWASP Top 10 and SANS Top 25 software guidelines, Federal Financial Institutions Examination Council's (FFIEC) regulations, including Payment Card Industry (PCI-DSS), HIPAA/HITECH and Sarbanes-Oxley Section404 (SOX).
Experience in implementing Security Incident and Event Management System (SIEM) using HP ArcSight.
Ability to handle multiple tasks and work independently as well as in a team.
An efficient team player in challenging and creative environment with excellent capacity to adapt new technologies and skills.
TECHNICAL SKILLS:
Standards & Framework: OWASP, OSSTMM, PCI DSS, NIST, FEDramp
Application Scanners: IBM Appscan, Checkmarks, Veracode and HP Fortify
Network &Security Tools: Nessus, Nmap, IOS, Routers, Switches, Routing, Layer 2/3 Switching, Virtual Private Networks (VPN), RIP, IGRP, EIGRP, OSPF, and BGPv4, ATM, PPP, TCP/IP, IPX/SPX, DHCP, DNS, WINS, NetBIOS, NetBEUI
Proxies/Sniffers Tools: Burp Suite, Web scarab, Wireshark, DirBuster
Operating Systems: Windows,RHEL,Windows XP, Windows 7, Windows 8, Windows 2000/2003/2008/2012 Servers, Linux & Unix Variants
Databases: MySQL, MS SQL, Oracle
Penetration: Testing Wireshark, Metasploit Framework
Programming Languages: C, C#, Java, python, JavaScript, Ruby, Swift, Obj-C, PHP, Perl, Visual Basic, .NET, Winsock, COM, ActiveX, Client-Server Applications, SQL & Access Databases
Security Technologies: Vulnerability Assessments, Penetration Testing, Forensics, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), VPN, Content Filtering, Firewalls, 2-Factor Authentication
Security Software: QRadar, FireEye, Websense, Multi-Factor Authentication (SafeNet, Blackshield, CRYPTOCard, RSA), WS FTP, Intrust, Active Roles Server, Archive Manager, Spotlight on Active Directory, Cisco IPS/IDS, Snort, ISS Real Secure & ISS Proventia - SiteProtector, Nmap, NBTScan, Kismet, Airodump, hotspotter, NetStumbler, SATAN, Scanssh, LANguard, SELM, LANguard Network Scanner, LANalyzer, PGP, GnuPG, NAI Sniffer Suite, Dsniff, Network General Sniffer, John The Ripper, Auditor Security Collection, BackTrack, Kali, NESSUS scanner
Web Administration/Design: IIS, Apache, PHP, SQL, Cyrus, Postfix, SSL, SSH, SFTP, FTP(S), WS FTP
Checkpoint: Nokia IP 330, Nokia IP 530, Nokia IP 740, Check Point 12000, 13000, 15000, 21000, 23000 series, Windows 2003/2008/2012/ NT & nix-based servers including SecurePlatform and Gaia
Palo Alto: PA-200, 220, 800, 3000, 5000 series firewalls and M-100, 200 series Panorama appliances
Work Experience:
Client: Prudential NYC (Remote) March 2020–Present
Title: Penetration tester/ Cyber Security Architect
Responsibilities:
Performing security analysis and identifying possible vulnerabilities in the key derivation function, create Vulnerability Assessment report detailing exposures that were identified, rate the severity of the system & suggestions to mitigate any exposures & testing known vulnerabilities.
OWASP Top 10 Issues identifications like SQLi, CSRF, XSS, Path Manipulation.
Perform pen tests on different application a week.
Perform grey box, black box testing of the web applications.
Create written reports, detailing assessment findings and recommendations.
Found web site security issues (XSS, CSRF, session fixation, SQL injection, information leakage, application logic etc.) across various platforms.
Perform risk assessments to ensure corporate compliance.
Controls on session management like Server-side session states, session termination, Session ID randomness, expiration, Unique tokens, concurrent logged in session, session fixation prevention.
Perform Static assessment of various applications by Static code analyzers like HP Fortify
Perform Dynamic assessment of applications by HP Fortify and verify false positives.
Develop threat modeling framework (STRIDE, DREAD) for critical applications to identify potential threats during the design phase of applications.
Performed static code reviews with the help of automation tools Veracode and checkmarks.
Perform the penetration testing of mobile (Android and iOS) applications, specifically, APK reverse engineering, traffic analysis and manipulation, dynamic runtime analysis.
Execute daily vulnerability assessments, threat assessment, mitigation and reporting activities to safeguard information assets and ensure protection has been put in place on the systems.
Perform, review and analyze security vulnerability data to identify applicability and false positives.
Work closely with research and development teams for vulnerability remediation.
Analyze and assessed risk in the environment.
Identify issues in the web applications in various categories like Cryptography, Exception Management.
Work with software development teams, DB/Unix administrators and solution architects as a subject matter expert related to security compliance with PCI DSS and industry standards.
Analyze parsed data from Qualys, Nessus for Vulnerability Remediation.
Work on Vendor based Applications, Middleware and layer products.
Provide both strategic analysis and near real-time auditing, investigating, reporting, remediation, coordinating and tracking of security-related activities for customers.
Analyze data and prepared reports that document vulnerabilities from network-based attacks and recommended actions to prevent, repair or mitigate these vulnerabilities.
Skilled using tools like Automatic Scanner, NMAP, Dir buster, Qualys guard, Nessus, HP Fortify, HP Web inspect, IBM appscan for web application penetration tests and infrastructure testing.
Perform remediation activities for Applications, OS, Database, Middleware, Digital Certificate, Layer Products, Java.
Identify issues on sessions management, Input validations, output encoding, Logging Exceptions, Cookie attributes, Encryption, Privilege escalations.
Proactively identified system vulnerabilities to reduce or eliminate potential exploitation using Nessus Security Center and Passive Vulnerability Scanning.
Work on Enterprise Release Management and Governance activities.
Work closely with all competency teams to effectively and efficiently remediate vulnerabilities.
Use Qualys, SPI, Remedy and various other tools in remediation effort.
Performed Scanning, analyzed data and took remediation steps.
KAFD - Bin Dayel, Riyadh, KSA Feb 2018 – Jan 2020
Title: Principal Cyber Security Architect
KAFD was inspired by King Abdullah’s vision to create a new financial district that will take the economy of Riyadh to new heights. Following its acquisition by the Public Investment Fund (PIF) of Saudi Arabia, KAFD has evolved to become a prime business and lifestyle destination capturing the core values of Vision 2030. While contributing to the growth and diversification of the economy, provide our community with a vibrant experience in the heart of Riyadh.
Responsibilities:
Technical security lead for all security related issues and decisions for the healthcare division spin-off of a major Fortune 500 manufacturer
Technical security lead defining the architecture and implementation of security policies, networks, and systems with strict adherence to PCI DSS contractual requirements.
Project Manager and Technical Lead for the reconfiguration and reimplementation of current security systems, including Check Point Firewalls/IPS/IDS, SafeNet Multi-Factor Authentication, Remote Discovery, Web Filtering/Antivirus, Secure File Transfer, and various security related web applications.
Managed requests and handled VPN, Citrix, and VDI issues related to enterprise PAC files for multiple domains.
Provided support for high level security issues related to Active Directory as a Domain Administrator
Technical lead for support of Check Point firewall infrastructure and migration to new OS and hardware
Technical lead for the export of Check Point Firewall firewall policies to firemon
Technical lead for the management of Check Point firewall and IPS policies
Provided administrative support for McAfee Proxy/Web Filter/Antivirus
Provided expert level support of SafeNet Multi-Factor Authentication using Black Shield and CRYPTO Card)
Provided senior level support to administrators of WS FTP, used for secure file transfers SFTP across multiple domains
Assisted with network security assessments for various business units.
Technical Lead for the deep discovery of corporate and manufacturing networks, including detailed mapping of applications, ports, and protocols, to properly create new, or reconfigure current, systems to the spin-off networks.
Technical lead for the migration of several external class C networks to an internal NAT configuration to meet compliance requirements including firewalls policies, servers, DNS, load balancing.
Used access to F5 load balancers to troubleshoot issues with DNS, s, and server migration issues.
Provided overall architecture guidance and high-level troubleshooting for the implementation of Access Data eDiscovery on all servers and client workstations.
Project manager and team lead tasked with migration of business partner user management system to spin-off domains and infrastructure (using powershell, vbscript, wscript, javascript, ADO, SQL, and more)
Provided senior level technical support for IIS servers hosting security software.
Responsible for reviewing, analyzing, and recommending cloud-based solutions for network security firewall zones, web filtering and web hosting.
Administrator for several SharePoint sites used to track issues and provide information for various teams.
Able to communicate and interpret advanced security concepts across global business units using VoIP, Instant Messaging, Lync and WebEx
Client: Dar Al Riyadh, Riyadh, KSA Aug 2017 – Jan 2018
Title: Senior Enterprise Security Architect
Responsibilities:
Architect and Technical Lead for the design of a multi-tiered network security architecture for the growing Fortune 500 enterprise
Technical Lead for the implementation of a Security Operations Center (SOC) to manage ongoing threats to the organization.
Provided detailed documentation, including network diagrams, for the implementation of a new network security architecture based on technical and business requirements.
Architect, Project Manager and Technical Lead for the reconfiguration and reimplementation of current security systems, including firewalls, IPS/IDS, routers/switches and antivirus
Technical Lead and Architect of an enterprise wide logging infrastructure and QRadar SIEM implementation
Mentored the SOC team by providing expert advice from previous alert/tuning experience from multiple SIEM systems
Technical Lead for vendor review and analysis of all 3rd party software, hardware, and network requirements
'Acted' as a mentor for less senior members, providing guidance on new assignments, testifying in court, s and career advice
Responsible for the design of unique and complex business requirements related to SCADA/Gas Pipeline security.
Technical Lead for the deep discovery of corporate and industrial control system networks, including detailed mapping of applications, ports, and protocols, in order to properly define security zones
Acted as a primary resource in the design, acquisition and implementation of a new firewall, HIPS, File Integrity Monitoring, remote data acquisition (EnCase) and SIEM infrastructure
Provided expert (3rd level) support for Multi-Factor authentication using RSA Confidential
Responsible for the direction of information security related decisions across all lines of the corporation.
Developed working relationships with key business and technical units to appropriately balance risks
Provided weekly briefings to key security personnel and management regarding new threats that impact our environment.
Client: MIG Group – SES, Riyadh, KSA Aug 2015 – Jul 2017
Title: Cyber Security Engineer
Responsibilities:
Developed custom SIEM deliverables in Splunk/McAfee/QRadar/ArcSight to meet customer needs in a variety of domains: IT security, financial, IT ops, human resources, physical security, etc.
Design, development, implementation, tuning and testing of standard and nonstandard content for Mcafee SIEM (Nitro).
Perform Digital forensics and Incident Response (IR) using tools Autopsy, Magnet, Stinger, etc. 28 DOL agencies
Served as the primary SME for RSA SecurID and all multi-factor authentication products including Azure MFA.
Maintained GIT repositories, branches and tags and Experience in Administering GITHUB repository.
Played a key role in deploying Symantec Endpoint Protection Manager and clients on a closed network
Worked as a PCI-DSS consultant to perform a 3rd party audit.
Establish and maintain an IT Compliance program for Financial Security Infrastructure team that minimize risks to IT objectives through effective, efficient, scalable, and cost-effective design and operation of controls, including Sarbanes Oxley (SOX), ITGC (IT General Control) using COBIT framework, and other domestic and international compliance requirements.
Involved in DLP data encryption, monitoring/reporting and remediation of internal and external threats/vulnerabilities.
Provided Azure Security and Compliance reviews and solutions for government systems to facilitate the secure and compliant use of Azure for government agencies and third-party providers building on behalf of government.
Ensured Azure Government system was compliant to meet a FedRAMP Provisional Authority to Operate (P-ATO) and DoD Provisional Authorization (PA).
Understand the threat landscape as related to vendors and perform vendor risk assessments
Works with Encase, FTK, Cellebrite, Gargoyle, IEF, tools, plus dozens of utilities for ripping, extracting, repairing, copying, de-duplicating, automating and more
Played an Integral role in migrating company's security firewall environment from FortiOS 4.0 firewall platform to Fortigate FG 100D.
Assist penetration testing and investigation.
Collaborate with Internal audit, External Audit, SOX PMO in a regular cadence, discuss changes to the control environment and prepare effective, efficient compliance and substantive test plans and SOX Calendar.
Work closely with the Risk and finance teams to associate a monetary value to security risks within the User Behavior Analytics (UBA) tool.
Worked on projects moving to cloud services such as Azure, Office 365 and Amazon Web Services (AWS).
Interacted with Cloud Service Provider (CSP) to conduct Incident Response (IR) and Contingency Plan (CP) exercises for Disaster Recovery Plan (DRP) and procedures.
Expertise in development of Information Security Programs based on frameworks such as NIST, NIST, NIST, ISO 27002, COBIT 5.0, FFIEC, GLBA, SOX, PCI & PII with IT Risk drivers KPI's and KRI's to ensure Financial regulatory compliance and data security.
Conduct internal and external security audits based on standard cybersecurity frameworks from ISO 27002, COBIT, NIST, OWASP and Cloud Security Alliance
Worked extensively in Configuring, Monitoring Elk,Extrahop.
Built proof of concept (POC) for Localization to use AWS for some transcoding workloads. AWS services used were EC2, S3, Lambda, Elastic Transcoder. Second phase would be to add Captions and Digital Rights Management (DRM).
Assessment guidance/standards used; NIST SP, NIST, NIST, ISO27002, ISO27005, to ensure regulatory compliance and proper assessment of risk.
Develop documentation for new/existing policies and procedures in accordance with Risk Management Framework (RMF), NIST SP requirements.
Used GZIP with AWS Cloud front to forward compressed files to destination node /instances.
Dynamic monitoring and analysis of Intrusion Detection Systems (IDS) to identify security issues for remediation. Analyze, recognize, correlate, and report any potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information from AccelOps SIEM, Snort logs and Checkpoint FW logs.
Consulted with business and technology partners to create and provide security recommendations and best practices.
Assisted CSO with completion of established goals, objectives, and streamlining of internal office procedures.
Deployed the following Azure services to enable IT Security and IT Operations to move applications into the Azure cloud environment by allowing for monitoring and alerting: Azure Operations Management Suite (OMS), Service Map, Network Watcher, and Wire Data
Conducted onsite penetration tests from an insider threat perspective.
Performed host, network, and web application penetration tests.
Provided leadership in architecting and implementing security solutions towards Qualys and SIEM tools like Splunk, Solutionary, LogRhythm, SCCM, Altiris, LanDesk, BigFix, McAfee/Symantec.
Push configurations and updates to multiple Splunk Enterprise instances via the Splunk Deployment Server
Support the reporting and outputs from cross-functional teams related to the vendor risk assessment process
Provide IT Governance, Risk, and Compliance (GRC) service to fulfil client requirements.
Experience with SIEM platforms (Splunk, Qradar, McAfee/Nitro, Arcsight, LogRhythm, Carbon Black)
Utilized Security Information and Event Management (SIEM), Intrusion Detection & Prevention (IDS / IPS), Data Leakage Prevention (DLP), forensics, sniffers and malware analysis tools, SSL/TLS, SOAP/XML, TCP/IP, HTTP and ddexpertise in open ssl. Moreover Experience in deploying and administering Dynatrace, APM Tools like Synthetic, DCRUM, UEM, & AppMon.
Managed Cyber Security threats through prevention, detection, response, escalation and reporting in effort to protect Enterprise IT Assets through Computer Security Incident Response Team (CSIRT).
Responsibilities for CSIRT included SIEM, Context Filtering, Web Security, Incident Tracking, IPS/IDS and Malware Analysis.
Responsible for troubleshooting and resolving firewall software and hardware issues, including VPNs, connectivity issues, logging, cluster configurations, and hardware installations for Checkpoint and Palo Alto firewalls.
Performed risk analysis using State approved risk analysis methodology based on NIST SP and ISO IEC 17799 methodologies.
Increased productivity by fine-tuning their IPS security policies allowing analysts to quickly identify threats on the network. Tune HIPS and VirusScan policies to support mission requirements as needed.
AWS CLI Auto Scaling and Cloud Watch Monitoring creation and update
Participate in design efforts for network security related portions of new applications along with application development areas and the network design for disaster recovery efforts.
Experience spans over SIEM, Threat Intelligence, Penetration Testing and Vulnerability Assessment, Security Architecture, PCI-DSS and Security Research.
Provide expertise with incident response, security event monitoring, vulnerability management, asset security compliance and data loss prevention utilizing McAfee Nitro (SIEM), McAfee ePO, McAfee DLP.
Expertise in development of Information Security Programs based on frameworks such as NIST, NIST, NIST, ISO 27002, COBIT 5.0, FFIEC, GLBA, SOX, PCI & PII with IT Risk drivers KPI's and KRI's to ensure Financial regulatory compliance and data security.
Advise and implement Symantec Best Practices and configuration management in the environment.
Working with a team where my primary responsibility is planning, installation, configuration, performance tuning, problem determination, and administration of a Security Information and Event Management (SIEM) solution.
Initiated a vendor risk assessment program
Used virtualization tools such as VMWARE and VIRTUAL BOX to build server infrastructure for Arcsight security solutions.
Coach and mentor new analysts in our Third Party Vendor Risk Assessment Program.
POC and assisted in deployment for Bluecoat Security Analytics across BOA Data centers and remote offices, scripting and data extraction for SSL/TLS CPS utilization, Malware, Firewall and F5 capacity management and high availability planning.
Design and implement a vendor risk assessment scorecard - to establish a risk benchmark, identify areas needing improvement, and as a periodic tool to assess overall risk status.
Configuring and implementing F5 BIG-IP, LTM, GTM load balancers to maintain global and local traffic.
Client: Honeywell Partners - KG Tech Arabia, Western Region, KSA Aug 2013 – July 2015
Title: Lead Cyber Security Engineer
Responsibilities:
Provide Cyber Security and IT enterprise subject matter expertise in designing and implementing effective network based cyber solutions to protect critical business processes and IT assets, develop and communicate solutions to both senior executives and highly technical staff. Develop network and security architecture solutions for marketing, capture and proposal efforts.
Lead for proposal technical volumes and planning and strategic initiatives. Provide cyber expertise for advanced persistent threat (APT) engagements, including detection, analysis and developing findings and recommendations reports and mitigation plans.
Develop cloud system and security architectures for analytics and infrastructure projects. Provide expertise in interpretation of industry and agency standards (CNSS, IC DCID, NIST) for IT service delivery, cloud architecture and implementation, and cyber security initiatives. IT project manager for CIRT/SOC, cross domain solutions and infrastructure projects including teh sourcing and selection of proposed solutions, development of process and procedures, service level agreements (SLAs), etc.
Develop CNO/CND/CNA/CNE/APT solutions for clients and business development efforts including security architecture, FW/IDS/VPN, Identity management and other systems. Analyze events that occur wifin commercial, federal and IC environments. Perform assessments of systems and networks and identify where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Technologies included Splunk, AFR, IdaPro, Procmon, VMware, IaaS, PaaS.
Saudi Bin Laden Group - MTTS, Jeddah, KSA Jun 2011 – Jul 2013
Title: Security Engineer
Responsibilities:
Responsible for installation and maintenance of new network connection for the customers.
Configured all the required devices and equipment for remote vendors at various sites and plants.
In-depth expertise in the implementation of analysis, optimization, troubleshooting and documentation of LAN/WAN networking systems.
Manage enterprise security systems, identifying key security risks, reporting risks to management with recommendations for corrective action utilizing NIST frameworks.
Design and Implementation of Bluecoat Proxy Infrastructure. Upgrading Radware Appwall WAF (Web application firewall) and fixing hot fixes and patches.
Supported nationwide LAN infrastructure consisting of Cisco 4510 and catalyst 6513.
Worked with cisco routers 2600, 2900, 3600, 3800, 7200 and 7600 and switches 2900, 3560, 3750, 4500, 4900, 6500
Perform ISO 27001, PCI and SOX Audits and drive them to the closure of findings.
Developed Cyber Security Standards on NIST Frameworks and insured their proper implementation to reduce the risk of vulnerability to IT assets.
Implementing various policies as per client compliance to restrict web access, troubleshooting proxy related access issues and generate Internet access reports using Websense web proxy
Creating compliance rules, extracting Security risks and auditing the policies in firewall using Tufin firewall monitoring tool
Reviewed encryption logs and DLP logs to regulate use base technological risk violations
Upgrade, managing and troubleshooting various issues with Cisco IPS
Rules implementation, log analysis, logical troubleshooting and managing various Checkpoint products-Power-1, UTM-1, Smart-1 appliances and Cisco ASA appliances
Part of Disaster Recovery Datacentre’s Security Configuration and Management team
Saudi Bin Laden Group - MTTS, Jeddah, KSA Jan 2010 – Mar 2011
Title: Network Operations
Responsibilities:
Increased competitive edge and insured compliance with policies and various regulations, e.g. HIPAA, by implementing new technology and guidance.
Negotiated contracts with various vendors for software, hardware and infrastructure.
Improved the main data center with upgrades to redundant power via APC data center battery backup and generators, fire suppression system, centralized routing and switching using Cisco equipment. Security was also upgraded by HID proximity cards for limiting access.
Reduced data entry costs by 20% by migrating from separate PCs to a Citrix environment and increased security by implementing two-factor authentication including biometrics.
Created and delivered training to technical staff in networking, UNIX/Linux, storage and security.
Reduced Spam over 90% and reduced virus risk by implementing host-based and gateway virus scanning with Spam filtering managed through a central console.
Implemented Outlook Web Access, Citrix and VPN to allow mobile user access. Deployed Blackberry server for mobile messaging, remote administration and monitoring.
Created manned helpdesk and technical support center using Altiris products for helpdesk ticket tracking, new software deployment, upgrades, monitoring, and disaster recovery.
EDUCATION & CERTIFICATION
MS in IT (MSIS) 2023 – 2024
MBA in Marketing 2010 – 2012
Preston Institute of Management Bachelor of Engineering in Industrial Electronics 2007 – 2010 NED University of Engineering & Technology
PMP (PMI - Project Management)
professional Cloud Architect (Google)
Cloud Security Engineer (Google)