Summary
Overview
Work history
Education
Skills
Timeline
Hi, I’m

KHAYAM KHURSHID

Luton
KHAYAM KHURSHID

Summary

A self-driven specialist with the ability to quickly learn new technologies and use them to produce operational gains. Experienced in Cyber Security, Risk assessments, Regulations, and Compliance . Seasoned professional experienced in vulnerability management and security improvement initiatives. Designs and delivers test models and methodologies for enhanced response protocols. Engages wider teams in development solutions for increased network safety.

Overview

7
years of professional experience

Work history

Nova Tech Shield, LTD

Cyber Security Consultant
08.2023 - Current

Job overview

  • Implement security measures to secure network infrastructure and systems
  • Implementing SIEM solutions to monitor and analyze security events in real time
  • Stay informed about the latest cyber threats and vulnerabilities
  • Utilize threat intelligence sources to proactively defend against emerging threats
  • Assist in compliance audits (e.g., GDPR, HIPAA, ISO 27001) and provide documentation
  • Ensure that security controls align with regulatory requirements.

Saleyla

Cyber Security Engineer
08.2020 - 04.2023

Job overview

  • Initiated and coordinated the implementation of new data security measures across the company's IT infrastructure
  • Implemented cyber security policies, information governance policies, and user access policies
  • IT Audit, Risk Management, Compliance, Control Testing, Process Review
  • Monitoring the alerts and triaging alerts
  • Analyzing the alerts
  • Responding to the alerts
  • Threat Hunting and Fraud detection which saved 44K USD of the company
  • Implemented Splunk for threat detection and alert generation
  • Endpoint Protection, Detection, and Response(EDR) with Crowdstrike and SentinelOne
  • Migrated applications from legacy infrastructure onto new platforms
  • Managed configuration, code deployments, patching, fixes, updates, and related processes such as scripting tasks for debugging and automation
  • Penetration testing on web applications
  • Participated in all phases of the system development life cycle, from requirements analysis through system implementation
  • Building monitoring and orchestrating solutions for deployments and upgrades

Iplex
Rawalpindi

Lead Developer
03.2020 - 08.2020

Job overview

  • Communicated with the client to understand the project and get the requirements
  • Collaborated with the project manager to decide the project budget, cost, and timeline
  • Assigning the tasks to the team
  • Doing the Website Audits, Website Security Audits and QA
  • E-commerce website security, website firewalls
  • AWS deployment and Web server hosting
  • Improved response average time to customers, as well as meeting yearly OKRs, an aided team in boosting customer satisfaction figures month after month
  • Suggested new features and updates in applications
  • Handling customers via live chat, answering questions on significant topics such as (SSL, DNS, GIT, SSH, FTP, Email.

Information Security Engineer
09.2019 - 05.2020

Job overview

  • Monitor and assess compliance with internal policies and external regulations
  • Conduct risk assessments and gap analyses to identify compliance issues
  • Prepare compliance reports and recommendations for improvement
  • Ensure compliance with cybersecurity standards (e.g., ISO 27001) and regulations
  • Manage security awareness training programs.

High Tech Innovations

Web Developer
04.2016 - 09.2019

Job overview

  • Developing custom websites, applications Dashboards, WordPress, and Shopify
  • Extracting data from the databases and generating reports for the dashboard
  • Website Security, OWASP, SSL Malware Detection, and Malware removal
  • EMAIL encryption and Form Data Encryption
  • Database Security, Data Parsing
  • Software Installation through Remote Connection
  • Customer Chat Support, Skype Support
  • Developed the HIPAA risk assessment portal
  • Maintenance and web security of over 100 websites

Education

Northumbria University

MS from CYBER SECURITY
2023

University overview

Key Modules: Ethical Hacking for cyber security Grade - Distinction Network Security Grade - Distinction Information Governance and Security Grade - Distinction Wireless Network Security Grade - Merit Research methods and project management Grade - Merit Information assurance and risk management Grade - Merit

Comsats Institute of Information Technology

Bachelor of Science from COMPUTER SCIENCE
2016

University overview

Skills

  • Network security, Firewalls, VPNs, and Endpoints Security
  • Ethical Hacking, Penetration Testing, NMAP, Metasploit, Burpsuite, Nikto
  • Threat Hunting and Incident Reporting
  • Implementing the Information assurance and governance policies
  • Security regulations compliance
  • Cyber Security Policies and Frameworks, NIST, ISO27001, ISO 27002, ISO
  • 21434, GDPR, HIPAA, OWASP
  • Backup, Contingency Plan, and Disaster Recovery
  • Security Information and Event Management (SIEM) using Splunk
  • Endpoint Protection and Response with SentinelOne, and Crowdstrike
  • Risk Management and Assessments
  • AWS infrastructure security, WordPress Security, Website Firewalls, Malware detection and removal
  • PHP, SQL, MYSQL, HTML, CSS3, Python, Java, C, C
  • Vulnerability analysis
  • Ethical hacking
  • Penetration testing
  • Incident Response Management
  • PCI Compliance
  • Data security

Timeline

Cyber Security Consultant
Nova Tech Shield, LTD
08.2023 - Current
Cyber Security Engineer
Saleyla
08.2020 - 04.2023
Lead Developer
Iplex
03.2020 - 08.2020
Information Security Engineer
09.2019 - 05.2020
Web Developer
High Tech Innovations
04.2016 - 09.2019
Northumbria University
MS from CYBER SECURITY
Comsats Institute of Information Technology
Bachelor of Science from COMPUTER SCIENCE
KHAYAM KHURSHID