Junaid Khan, CISM, ITIL
Details
University of California, Berkeley
Bachelor of Science
Cybersecurity
Norwich University
Project Management
Solus Informatics Pvt Ltd.
2018 :
GIAC
Network Forensics
SANS Technology Institute
Six Sigma
Brown Belt
Seagate Technology
2004 :
Samsung Research America (SRA)
Information Security Manager
2001 : 2018
Seagate Technology
Network Sr Staff Engineer
Sr. Network Security Engineer part of (ERG) Engineering Research Group in Network Associates
1999 : 2001
Network Associates
Sr.Network Security Engineer
1999 : 1999
State of Michigan
Network Security Engineer
1997 : 1999
Arab National Bank
Internet infrastructure developer
Skills
Amazon Web Services (AWS), Auditing, Business Innovation, Business Strategy, Checkpoint, Cisco Routers, Cisco Technologies, Cloud Administration, Cloud Computing, Cloud Security, Computer Hardware, Computer Security, Data Center, Data Security, Digital Strategy, Disaster Recovery, Executive Leadership, Firewalls, Hardware, Information Security, Internet Protocol Suite (TCP/IP), Juniper, Juniper Networks Products, Juniper Technologies, Leadership, Leadership Communications, Linux, Management, Marketing Management, Network Architecture, Networking, Network Monitoring Tools, Network Security, Organizational Leadership, PIX, Public Relations, Sales, Security, Servers, Storage, TCP/IP, Transformational Leadership, Troubleshooting, Venture Capital, Virtualization, Virtual Private Network (VPN), VMware, VMware ESX, vpn, Windows Server
About
Cybersecurity, Information Management, Cloud Security, Provisioning (CSPs) Amazon-AWS, Google-GCP, IoT Security, Designing and deployment of defensive methodologies such as perimeter defense, defense-in-depth using various firewall (Cisco, Fortinet, Checkpoint, Juniper, Paloalto/Panorama) on-prem and in the cloud, Employee VPN/Business Partner VPN, on-demand VPN solutions. Network Segmentation, Zero-Trust Model.
- Programming Languages: C, C++ Shell scripting, Bash, Korn, Python.
- Data Manipulation and Visualization: Scikit-Learn, NumPy, Pandas, Machine Learning.
- Functional: Leadership, Critical Thinking, Strong Verbal & Written Communication, Organized, Analytical, Collaboration.
I also have an excellent understanding of enterprise cybersecurity NIST/CSF framework, CIS Controls, various threat models, programs, and risk management through hands-on experience. I could make recommendations to senior-level management concerning cyber security risks, impacts, and mitigation in the near and long term.