Junaid M. Status: Offline
Lahore Cantt,ย Pakistan
50% Job Success

Information Security Consultant | Trainer | Cloud Security Expert |

๐Ÿ‘‹ Hi there! I'm Junaid Mumtaz, a Cybersecurity consultant with extensive experience in information security, security operations center (SOC), and cloud security. With over 5 years of industry experience, I've collaborated with diverse clients and industries. ๐Ÿ‘จโ€๐Ÿ’ป ๐’๐ž๐ซ๐ฏ๐ข๐œ๐ž๐ฌ ๐Ž๐Ÿ๐Ÿ๐ž๐ซ๐ž๐ ๐ˆ๐ง๐œ๐ฅ๐ฎ๐๐ž: 1-SOC Design and Implementation 2-Threat Detection and Response 3-Vulnerability Assessment 4-Security Awareness Training 5-Technical Cybersecurity Training 6-Penetration Testing 7-Risk Assessment 8-Compliance Assistance 9-SIEM Selection and Deployment 10-Incident Response Planning 11- Security Architecture Deployment ๐Ÿ‘จโ€๐Ÿ’ป ๐„๐ฑ๐ฉ๐ž๐ซ๐ญ๐ข๐ฌ๐ž ๐š๐ง๐ ๐’๐ž๐ซ๐ฏ๐ข๐œ๐ž๐ฌ ๐Ž๐Ÿ๐Ÿ๐ž๐ซ๐ž๐: From crafting comprehensive security policies to ensuring compliance and designing robust security architectures, I provide end-to-end services encompassing the best security practices. Specializing in assisting clients, I excel in setting up a seamless information security program that seamlessly integrates into their operations. By meticulously addressing every aspect of security, from policy design to implementation, I ensure that clients are equipped with a robust framework to safeguard their assets and data against evolving threats ๐Ÿ‘จโ€๐Ÿ’ป๐€๐๐ฏ๐š๐ง๐œ๐ž๐ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐“๐จ๐จ๐ฅ๐ฌ: ๐๐ซ๐จ๐Ÿ๐ข๐œ๐ข๐ž๐ง๐ญ ๐ข๐ง ๐ฎ๐ญ๐ข๐ฅ๐ข๐ณ๐ข๐ง๐  ๐š ๐ฐ๐ข๐๐ž ๐š๐ซ๐ซ๐š๐ฒ ๐จ๐Ÿ ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐ญ๐จ๐จ๐ฅ๐ฌ ๐ข๐ง๐œ๐ฅ๐ฎ๐๐ข๐ง๐ : Intrusion Detection Systems (IDS/IPS) Data Loss Prevention (DLP) Endpoint Detection and Response (EDR), Extended Detection and Response (XDR), Managed Detection and Response (MDR) Security Information and Event Management (SIEM) Vulnerability Scanning Web Gateway and Proxy Appliances Antivirus Tools ๐“๐ž๐œ๐ก๐ง๐ข๐œ๐š๐ฅ ๐๐ซ๐จ๐Ÿ๐ข๐œ๐ข๐ž๐ง๐œ๐ฒ: ๐’๐ค๐ข๐ฅ๐ฅ๐ž๐ ๐ข๐ง ๐ฐ๐จ๐ซ๐ค๐ข๐ง๐  ๐ฐ๐ข๐ญ๐ก: Azure Sentinel Azure Devops Azure cli Mixed Windows/Linux environments Virtualized/Physical server environments Programming languages: C, JavaScript, HTML5, CSS, AQL, Regex Hands-on Experience with Various Security Technologies: Including but not limited to: Microsoft Defender for Endpoint O365 Security Qradar SIEM Wazuh Cloud Carbon Black EDR FortiGate, FortiAnalyzer, and Web Application Firewall (WAF) Cloudflare IBM Resilient and SIRP SOAR FireEye (HX, NX) Sophos Web Security Appliance (WSA) Kaspersky Security Center Symantec Endpoint Protection Cisco FMC and Stealthwatch ๐Ÿค ๐’๐จ๐Ÿ๐ญ ๐’๐ค๐ข๐ฅ๐ฅ๐ฌ: In addition to my technical prowess, I prioritize soft skills, enabling me to foster strong relationships with clients, customers, and colleagues. I excel in simplifying complex technical concepts and actively listening to clients' concerns to provide tailored solutions. ๐ŸŽ“ ๐‚๐ž๐ซ๐ญ๐ข๐Ÿ๐ข๐œ๐š๐ญ๐ข๐จ๐ง๐ฌ: I hold several certifications, including: 1- Microsoft Certified Security Operations Analyst (SC-200) 2- Microsoft Security, Compliance, and Identity Fundamentals (SC-900) 3- Microsoft Certified Microsoft Azure Fundamentals (AZ-900) 4- Microsoft Certified Identity and Access Administrator (SC-300) 5- Certified Ethical Hacker (CEH) ๐Ÿ” ๐’๐ฎ๐ฆ๐ฆ๐š๐ซ๐ฒ: In essence, I bring extensive experience and a robust skill set to the table as a seasoned security analyst specializing in information security, SOC, and cloud security. With my expertise and certifications, I'm dedicated to delivering bespoke and high-quality security services to clients. If you're in need of a security analyst who can deliver results, look no further!
Work history

Junaid M. has more jobs. Create an account to review them
Skills

Skills

  • Cybersecurity Management
  • Malware Removal
  • Penetration Testing
  • Information Security
  • Network Security
  • Vulnerability Assessment
  • Security Policies & Procedures Documentation
  • Security Operation Center
  • Intrusion Detection System
  • Microsoft Active Directory
  • Security Analysis
  • Microsoft Azure
  • Virus Removal