ABOUT ME
Who I Am
I am a Cybersecurity graduate with a passion for research and innovation. I specialize in building secure, scalable applications while conducting advanced security assessments. With a solid foundation in information security and a growing expertise in AI-based security solutions, I am continuously expanding my skill set to become a well-rounded Cybersecurity researcher and analyst.
I specialize in:
- • Vulnerability Assessment (SIEM, SOAR, EDR, IDS/IPS, Firewall)
- • Security Research & Analysis (Post-Quantum Cryptography)
- • AI-based Security Solutions (Machine Learning, Threat Detection)
- • Digital Forensics & Incident Response
- • Smart Cities & IoT Security
EXPERIENCE
Where I have
worked
Cytomate Qatar
AI Security Developer
Proposed and helped develop an AI-based brand protection tool to detect phishing and impersonation threats.
Supported real-time network monitoring and automated threat response processes.
Researched machine learning applications in cybersecurity.
Contributed to the development of automated security assessment tools.
AlrightTech
Cyber Security Analyst
Implemented and configured firewalls to protect internal networks and services.
Detected and analyzed security events using SIEM tools within the environment.
Performed comprehensive vulnerability assessments and security incident analysis.
Developed and maintained security policies and compliance documentation.
Siber Kuza | NASTP
Security Researcher
Performed network vulnerability assessments and analyzed security incidents.
Supported threat intelligence gathering and compliance reporting.
Conducted research on emerging cybersecurity threats and mitigation strategies.
Collaborated with security teams on incident response procedures.
NCCS LAB
Security Research Assistant
Performed threat modeling and network vulnerability scans using Nmap.
Helped draft technical security reports and compliance documents.
Assisted in security research projects and vulnerability assessments.
Supported lab operations and security testing procedures.
Projects.
Following projects showcases my skills and experience through real-world examples of my work. Each project is briefly described with links to code repositories and live demos in it. It reflects my ability to solve complex problems, work with different technologies, and manage projects effectively.
AI-based Brand Protection Tool
Developed an AI-powered platform that detects phishing attempts and brand impersonation threats in real-time, protecting organizations from cyber attacks.
SIEM Security Analytics Platform
Comprehensive SIEM solution for detecting, analyzing, and responding to security events across enterprise networks with automated threat intelligence.
Vulnerability Assessment Framework
Advanced vulnerability assessment framework that performs comprehensive network scans, identifies security weaknesses, and generates detailed compliance reports.
Publications & Research.
My research contributions to the fields of cybersecurity, artificial intelligence, and software engineering through peer-reviewed publications and conference presentations.
Smart Cities: A Novel Framework for Energy Production and Harvesting Using Renewable Energy
IEEE International Conference on IT and Industrial Technologies (ICIT2023)
This paper presents a comprehensive framework for sustainable energy production and harvesting in smart cities using renewable energy sources and IoT technologies.
DelSec: An Anti-Forensic Data Deletion Framework for Smartphone IoTand EdgeDevices
IEEE 3rd International Conference on Electronics, Computing and Technology (ICECT2023)
A novel anti-forensic framework designed to securely delete sensitive data from IoT and edge devices, ensuring privacy protection in distributed computing environments.
Post Quantum Cryptography: Safeguarding the Digital Future and Bolstering Security in Critical Sectors
Cyber Defense Magazine (International)
An in-depth analysis of post-quantum cryptographic methods and their implementation strategies for protecting critical infrastructure against quantum computing threats.
A Survey of Cybersecurity Laws, Regulations, and Policies in Technologically Advanced Nations: A Case Study of Pakistan to Bridge the Gap
Springer
Comprehensive survey analyzing cybersecurity legal frameworks across technologically advanced nations with specific focus on Pakistan's regulatory landscape.
The Unintended Consequences of Electrifying Police Fleets
Scholar Strategy Network
Analysis of the cybersecurity implications and unintended consequences of transitioning police fleets to electric vehicles and connected technologies.