Zeeshan UPDATED
Zeeshan UPDATED
Zeeshan UPDATED
Over All 15 years of Experience as Trainer and speaker with overall 2 decades experience in IT
and research scholar on dark web. B.Tech qualified professional with various cybersecurity
certifications.
The breadth of knowledge in cybersecurity, Threat intelligence, hunting and analysis, web
application vulnerability testing, Automotive Cybersecurity, SOC Analysis, Cyber Threat
Intelligence,IoT security, Deception and Dark web investigation, Cryptocurrency Investigation
and Digital Forensics.
Proven track record and over a decade plus of experience in providing various cybersecurity
training programs for the corporates in IT, IoT, Embedded Systems, Automobile, Scada - OT,
and also for Law enforcement agencies.
Delivered various cybersecurity training and consulting projects in India, USA, UAE, Saudi
Arabia, Thailand, Singapore, Malaysia, Sri Lanka, Cambodia, Netherlands and trained senior IT
teams in Corporate, Government and Banking Sectors.
Takedown Services: Imposter, impersonated, and illegitimate online, social media abuse.
Audit : Conducted audits based on NIST 800-53, ISO 27001 and CoBIT.
Thanking you.
Page 1 of 4
C u r r i c u l u m V i t a e
F A R O O Q
IT / COMPUTER INSTRUCTOR - MCT
Objective:
To contribute exceptionally strong technical aptitude and education to an organization that can use a
skilled manager, trainer, and hands-on information systems/communications professional.
Summary of Qualifications
Computer Technology Instructor with extensive experience in Network Administration, Project
Management and Quality Management. Consistently recognized and awarded for performance. Key
areas of expertise include
Instruction:
Technical Instruction Research and Evaluation Student Assessment
Curriculum Development Lecture Techniques Lesson Plans
Computers:
Microsoft Operating System Mac Operating System Cyber Security
Network Administration Advanced excel DevSecops
Malware Analysis Cissp CISA (Security Audit )
Internet Technology Python programming MS Office Profes-
sional
Skills worked on
Application Security
Access Control - MAC, DAC, UNIX
Malware Analysis - Memory Forensics
Intrusion Detection - HIDS, NIDS
Honeypots
Reverse Engineering
Web Security
Data Security - Cryptography
Network Security + VPN
Secure Development - Secure Coding + DevSecOp
Android Security
Hands-on Security - Network traffic analysis + CTF + VAPT
.
Senior Cyber Security Trainer at value c Consulting/Workopolis/grey campus/IIHT/VIIT/
/IIBM/eHack Academy/SFJ for Various Clients (Wipro, Mass Mutual as Freelancer)
Provided a Cyber Security Training for Army Cyber Group AT DELHI on 2022-2023
Page 2 of 4
C u r r i c u l u m V i t a e
Conducting penetration testing (onsite and remote)
• Conducting Computer Forensics and Web Application Forensics for major countries in
the Europe, Africa and Asia.
• Conducting cyber security training in Europe, Africa and Asia.
• Conducting training for clients on-site as well as off-site
Responsibilities: (Instructional & Work Experience)
Performs the task of designing training programmes and courseware on Advanced Secu-
rity & Management Solutions for the organization.
Responsible for updating and tailor course curricula to meet the needs of students and
clients, to keep courses and skills up to date with current standards, versions of courses
(materials and certification exams) and technologies (current and emerging).
Conducts trainings – both in-house and public for clients
Works on extensive hands-on exercises for reinforcement of concepts, software and cod-
ing best practices, natural progression of comprehensive skills and practical applications
of the technologies in real-world situations.
Assigns the tasks of auditing & proposing solutions to improve current security levels
for Clients
Performs Risk Assessment Services and provides Solutions to mitigate Risks discovered
and reported
Ensures that the operation, design, and management of information systems are in ac-
cording to the standards of the organization
Identifies as well as applies innovative practice in security to enhance the global opera-
tions based on the requirement of clients
Provides leadership to a team of Information security consultants
Establishes and implements certification and accreditation procedures for various infor-
mation systems and platforms for clients
Ensures that risk identification, mitigation controls and analysis are integrated into appli-
cation life cycle and change management processes
Projects Handled
Page 3 of 4
C u r r i c u l u m V i t a e
ECC05702515322) CompTIA Advanced Security Practitioner
ITIL® Foundation V4 (CAS-002)
CISA (Certified IS Auitor) CCNA – Routing & Switching 640-802)
Personal Information:
Age : 40Years
Date of Birth : 20- 10 - 1983
Gender : Male
Nationality : Indian
Marital Status : Married
Father’s Name : Mohammed Hammed Farooq
Languages Known : English, Hindi,
Strengths : Integrity, Sociability, Ambitious, Team Player,
Determination.
Personal Traits : Adaptability, Willingness to Learn, Ability to work in a team
Declaration:
I here by declare that the above-mentioned information is true to the best of my knowledge and
belief.
Farooq
Page 4 of 4