Zeeshan Ahmed Khadeer
Career Summary
Has around 5 years of experience implementing security in different phases of SDLC; hands-on experience in Incident management, vulnerability assessments, and OWASP using security testing tools. And has experience working in an Incident response and NOC environment, using tools like ArcSight and Splunk.
Highlights:
Prioritization and assignment of all Incidents, Service Requests, Changes, and Problems assigned to the team’s Service Now queue
Investigation and diagnosis of all Incidents, Service Requests, Changes, and Problems assigned to the team, documenting findings in ServiceNow and reassigning to appropriate groups where required
Resolution of all Incidents, Service Requests, Changes, and Problems that fall within the scope of the team access and ability to provide recovery of service
Worked through the DREAD approach which is used for ranking the threads as per the CVE calculator and applying them mitigation as required.
Experience with network infrastructure architecture and administration
Strong knowledge of manual and automated security testing for web applications
Good experience in exploiting recognized vulnerabilities, CSRF, XSS, SQL Injection, session management, input validations, output encoding, cookie attributes, encryption, privilege escalations
Resolved escalated tickets in ServiceNow ensuring clients had uninterrupted access to web applications
Involved in implementing and validating the security principles of minimum attack surface area, least privilege, secure defaults, avoiding security by obscurity, keeping security simple, fixing security issues correctly
Experience in Threat Modeling during requirement gathering and design phases
Performed software Licensing audit
Excellent problem-solving and leadership abilities
Experience working in a 24/7 support monitoring environment
Had worked on Service now as a ticketing system for solving the issues.
Technical Skills
Security Standards
OWASP, SANS, NIST.SOX, ISO 27001
Tools
Web Inspect, Checkmarx, Nmap, Nessus, Burp Suite, Splunk, FireEye, Nessus Vulnerability Scanner, Wireshark, ServiceNow, OWASP, BURP Suite, ITIL, Splunk, SaaS
Operating Systems
Windows 7/8/10, Kali Linux, Mac, Unix
Networking
TCP/IP architecture, OSI model
Cloud Technologies
AZURE, AWS
Professional Accomplishments
Rivian Automotive, LLC Oct 2021 to Present
Major Incident and NOC Analyst
Has the duty to manage incidents with a priority of 1 or 2 and communicate with stakeholders while upholding SLAs.
Establish major incident communication channels with all stakeholders and make sure the resolution teams are adhering to the incident management methodology.
Take the initiative to resolve the issue within SLA and adhere to the problem management process.
Collaborated with other teams to identify improvement opportunities and make sure the incident management process is successful from beginning to end.
Analyzed the extended managed service providers' operational support and oversee the corrective actions.
Created incident-related performance analysis and reports for IT managers to analyze.
Performed other tasks relevant to the job that was assigned
In depth understanding of necessary technologies, including phone and data networks, LAN/WAN, security infrastructure, Windows, and Unix platforms, etc.
Worked closely with other teams in the development of business-aligned incident management processes
Creates policies and processes to make sure action items related to incident management and the service desk are tracked and completed.
Management and oversight of Incidents and communications at various levels during the incident life cycle
Understanding business needs and assisting in adjusting internal processes to meet these needs
Monitoring Incident Management team levels of performance against agreed quality standards and KPIs
Ensuring the development of the Incident Management team, proactively identifying areas for improvement
Acting as a point of escalation for any technical issues within the team
Highly skilled in all aspects of Incident Management. (ITIL)
Ability to coordinate various levels of IT Services personnel across multiple locations and cultural backgrounds
Ability to multitask time-critical tasks whilst maintaining the highest levels of quality
Knowledge of current IT infrastructure and application technologies.
Nexa IT Resources March 2019 to Aug 2021
Vulnerability Analyst
Deployed, completed, and created reports of IT risk profiles and risk assessments
Identification of injection, business logic, authentication, session management-related flaws in applications and encased attack scenarios and associated risk to the business
Provided preventive, mitigation, and compensation controls to ensure the appropriate level of protection and adherence to the goals of the overall information security strategy
Worked closely with application development teams to participate in design reviews and provided inputs from the security point of view at the early phases of development
Conducted security assessment for all user roles efficiently
Conducted rigorous security assessments for the application using tools such as Burp Suite, SQL Map, Fi Map, Directory Buster, OWASP ZAP, Nessus, NMap, Kali Linux
Actively searched for potential security issues and security gaps that were beyond the ability of detection by any security scanner tool; initiated and developed new mechanisms to address unidentified security holes and challenges
Used standards such as CVSS (Common Vulnerability Scoring System), CVE, and DREAD approaches to provide the criticality (Critical, High, medium, Low) rating to the vulnerability identified
Good knowledge of network and security technologies such as Firewalls, TCP/IP, LAN/WAN, IDS/IPS, routing, and switching
Assisted in IT security compliance policies framework reviews (such as ISO 27001/2, NIST, SOX COBIT, HIPPA) for various IT platforms, developed and interpreted IT security policies, technical security standards, security operating procedures, and processes for various technologies to stakeholders
Maintained, created, and operated a schedule of vulnerability scanning, including business coordination with IT stakeholders, established vulnerability scanning resolution on the server, AZURE cloud, and desktop environments
Experience with ITIL tasks using the JIRA ticketing tool and tasks given through managers (procedure, task, and checklist).
Familiar with AWS and instance.
Fairbit LLC August 2017 to January 2019
Security Analyst I
Managed and monitored real-time events for the security devices (Firewall, Routers Servers) using ArcSight
Performed log monitoring and analysis for devices such as Cisco firewalls, IDS, IPS, Windows servers, Unix servers, and proxies
Incident analysis and management in the Security Operations Center
Prepared daily reports and security advisory for devices
Prepared monthly incident reports with a complete analysis of client devices which included the top virus-infected machines and top attacks on vulnerable ports
Monitored all critical ports of firewalls for continuous security threats and performed false-positive analysis/troubleshooting for known less critical security incidents
Performed security analysis and vulnerability assessments with Nessus
Participating in monthly customer review meetings to discuss various networking equipment performance
Used SPLUNK Enterprise to perform to establish network baselines and alerts and carried out Network monitoring tasks as per requirements.
Knowledge of the NAGIOS tool for overall network and appliance monitoring.
Experience working in a 24/7 support monitoring environment.
Education/Certifications
University of Cumberland
Master of Science in Information Security