Professional Documents
Culture Documents
Confidential Information
WAQAR AHMAD
Disclaimer
Confirmation: I confirm that I have read and agree to the above stated policies.
Basic information
Permanent address
Country: PAKISTAN
Street address: 48 B Traders Colony, Bharakaho
City: Islamabad
Region: Punjab
Postal code: 45400
Supporting information
Statement of purpose: My name is Waqar Ahmad. I did my MSc (Internet, computer, system security) from University
of Bradford, UK. I completed my BS (Hons) in computing from University of Bradford.
> How does OIST and my desired research unit(s) fit with my current expertise and skill set?
As I have done my MSc in Information Security so in order to polish my ethical hacking skills and to gain some
practical knowledge I decided to get the training of Certified Ethical Hacker (CEH). CEH certification is one of the
hottest picks for IT security professionals pursuing a career in penetration testing. I also learned about intrusion de-
tection system/intrusion prevention system (IDS/IPS), network access control (NAC), data loss prevention (DLP) and
enterprise anti-virus solutions. Other relevant topics covered in my CEH training include Mobile Hacking, System
Hacking, Sniffing, Social Engineering, DOS, DDOS, Penetration Testing, Secession Hijacking and Man in the Middle. I
think this CEH is most relevant and would prove very useful in continuing my research internship in Quantum Systems
Unit at OIST because I can make use of my practical knowledge I obtained from my previous cyber security field into
my internship at OIST.
Other than CEH I am Microsoft Certified Professional MCP as well. I also successfully completed my Windows Server
2008, Server Administrator in 2011. So I was introduced to analyzing system logs and identifying potential issues with
computer systems, Performing routine audit of systems and software, Applying operating system updates, patches,
and configuration changes. Installing and configuring new hardware and software and answering technical queries
and assisting users. After finishing the training I successfully got the certification of Microsoft Certified Technology
Specialist (MCTS) by an online test conducted at Microsoft testing center. I also have got the RHCSA and CCNA
training where I had a chance to get a firm grip on my practice capabilities of systems administration.
I also have done couple of other certifications and trainings which are related to computer science as well as cy-
ber security. Which include following CompTia Network + (Ebryx CSIRT Trainings), CompTia), Security + (Ebryx
CSIRT Trainings), GIAC (Comprehensive Packet Analysis), SANS SEC-556 training, GIAC GSEC (Security Essen-
tials), SANS SEC-401 training, GIAC GCIA (Intrusion Detection In-Depth), SANS SEC-503 training, GIAC GMON
(Continuous Security Monitoring), SANS SEC-511 training. I hope my relevant certifications and trainings makes me
suitable candidate for OIST internship program.
If you are interested in multiple research units, please explain your interest and fit for each briefly within one sin-
gle statement.
Yes, I am indeed interested multiple disciplines also.
Now I want pursue my career by doing internship at OIST. I think this internship would be really helpful to enhance my
knowledge in Quantum Systems Unit area and will enable me to see the world from the eye of an amazing university
OIST which has no departments so that there is no barrier between inter related fields and disciplines.
I believe that would be a unique and one of its kind opportunity for me because normally other universities students
and learning environment is divided into multiple fields like maths, computer science etc.
The purposed this internship is to explore the university, new people and to meet talented professors and students
there. Also I would love to find out and meet the professors and students who have similar research interest like me.
Which can be my potential future PHD Research companion if I get PHD at OIST in future.
I hope this internship will also give me opportunity to explore research area to redevelop the Mobile Security Mod-
ules (ASM) framework that aims to improve the security of android and iOS devices in order to prevent the hackers
to misuse the mobile applications permissions, Because I already have done MSc Information Security moreover my
relevant skills like CCNA, MSITP, RHCSA and most importantly my cyber security training are genuine drive and moti-
vation for this internship at OIST.
> How does a research internship at OIST fit into my overall career plans/aspirations?
As I have been working at different companies for my job and career particularly in CS area. So I believe that my
internship at OIST is a door to new opportunity for me for my future career. I have heard that those students doing
research at OIST have the access to the world class laboratories and equipment’s for their particular research areas.
Moreover, as OIST provides students with centralized research resources and technical support so I believe this in-
ternship is going to not only enhance my relevant knowledge but also going to play an important role for my future
research career in cyber security.
Lastly I would like to say, as you can see in my CV I have done multiple jobs in industry so in order to enhance
and enrich my industry based knowledge, I would love to explore more from the internship how Japanese nation work.
Not only I am already inspired by the Japanese nation but also because of this OIST internship boosting my career
goals in cyber security research would be an extraordinary achievement for me.
That’s why I have decided to pursue this internship program at OIST Japan. Looking forward to get a positive feedback
soon.
Education history
Education history:
City: Bradford
Converted GPA: 3.4
Country: UNITED KINGDOM
Dates attended/attending: September, 2013 to December, 2014
GPA Score: 3.40
Help Text for adding new entries:
Honors, Awards, Fellowships and Scholarships: Post Graduate Representative at University
Institution: University of Bradford
Level of study: Master
Level of study (Other):
Major: Computer Science
GPA Scale: 4.00
Primary language of education is English: Yes
Region: Yorkshire
Document- Transcript
PAGE 1 OF 3 SEE SECURITY INFORMATION ON PAGE 1 PAGE 1 OF 3
University of Bradford
Security Information
You are viewing a PDF document (or a print out of that document) that was generated by University of Bradford and
was downloaded by the individual named in the document from a website hosted at University of Bradford https://
edocs.brad.ac.uk/.
This PDF (or print) is NOT a secure document. It was created from the official document at time of production, but could
have been tampered with since it was downloaded or printed.
Recommendation
The secure original document resides online at University of Bradford. University of Bradford provides a free and secure
online service for recruiters and other third parties to verify the authenticity of official documents issued to its student and/
or graduates. While this service allows students and graduates to control who sees their information, only authorised
officials of University of Bradford can create actual documents. This the most secure way to verify these documents.
To use the system, you should contact the student or graduate who provided you with this document, and ask them to
log on to the student/graduate area at https://edocs.brad.ac.uk/ and create a Document Share for you using the secure
email delivery as the delivery method (they will need your email address for this). The Document Share is a generated
URL linking back to a secure website at University of Bradford (https://edocs.brad.ac.uk/). The Document Share URL
will be delivered directly to you by certified email from University of Bradford, so that you know the URL is legitimate.
When you visit the Document Share URL, you may be required to register with the system. Registration is free and
straightforward, and may be required by the individual named in this document in order to restrict access to their
document for Data Protection reasons. Once you are registered and logged in (or if no registration was required by the
student/graduate), visiting the Document Share URL will cause the document to be verified online and you can be sure
you are viewing the document as it was originally issued by University of Bradford.
Data Protection
This document contains personal information about the individual named in it and may be subject to Data Protection
laws in your jurisdiction. This information may only be used with the consent of the individual named in the document
and for the purposes agreed with the individual. You may not distribute this information to a third party without the prior
consent of the named person.
Further Information
For further information, please see the University of Bradford website at: https://edocs.brad.ac.uk/.
6. University Regulations
Programmes, modules, Each programme of study at the University of Bradford is made up of a number of modules, taken at different stages of
credits and levels the programme. Modules are available in multiples of ten credits. Each 10-credit module requires the average student to
undertake approximately 100 hours of study, including contact time. This means that a full-time undergraduate student
will study for about 1200 hours in an academic year, spread over 30 weeks (2 semesters); a postgraduate will study for
an additional 600 hours in a third trimester, usually on a project.
Each module has a designated level, which reflects how advanced the material is. Usually, the level is the same as the
stage number (the year) in which the module is taken.
For each award, some modules are compulsory and some optional. Students may take some elective modules, which
may not be related directly to their award but which address an area that is of interest to them (such as studying a
language).
The curriculum for each programme of study is described in a programme specification, which designates the title, credit
value, level, stage and semester of each module, and whether it is compulsory or optional.
Progression and Award A student is permitted two attempts at each module, the initial one and one supplementary assessment, as of right. A
third attempts will be granted if a student achieves 80 credits at 40% and has undertaken the second attempt. One further
attempt (total of 4, including the initial attempt) is at the discretion of the Board of Examiners according to their School
algorithm for fourth attempts. The best mark is used to determine the amount of credit achieved and whether a student
meets the progression criteria. Following supplementary assessment, a capped mark of 40% (or the original mark if
higher) is used to calculate degree classifications and eligibility for an award with merit or distinction, where appropriate.
If an assessment is not taken at the first attempt, without good cause, or is handed in late, a mark of zero is awarded
(which is used in the calculations for classification). If a mark is not achieved, at the first attempt, a numbered subscript
shows the bona fide attempt number next to the mark on the transcript.
Postgraduate awards in the School of Management use a grading system rather than numeric marking. Module results
are graded as follows:
Travel information
WORK EXPERIENCE
Ebryx, Pakistan 01/2021 – Current EDUCATION
Sr. Information Security Engineer (SOC)
Currently working at Ebryx Technologies in SOC (Security MSc Cyber Security 09/2013 – 12/2014
Operations Center) team. Responsibilities included are but not University of Bradford, UK
limited to continuously monitor and improve organization's BS (Hons) Computing 09/2009 – 08/2012
security posture while preventing, detecting, analyzing, and University of Bradford, UK
responding to cybersecurity incidents.
DHE Network Administration 09/2008 – 08/2009
Namal College, Pakistan
OCBC Bank, Singapore 04/2019 – 08/2020
Cyber Security Engineer (DLP)
While working at Cyber Technology Support (CTS) team at
CERTIFICATIONS & TRAININGS
TISO-OCBC, handled the Web Content Scanning (Data Loss
Prevention) system for the Bank and its subsidiaries (Bank of
Singapore, OCBC Malaysia, OCBC Wing Hang, OCBC Intl). C|EH (Certified Ethical Hacker)
Worked as a lead engineer for Web Content Scanning WCS CCNA (Cisco Certified Network Associate)
System at Bank. Responsibilities included Policies deployment, MCTS (Microsoft Certified Technology Specialist)
fine-tuning, raising exceptions requests, communicating with MCP (Microsoft certified Professional)
stake holders regards DLP requests and then implementing RHCSA (Red Hat Certified System Administrator)
those DLP Exception requests. RHCE (Red Hat Certified Engineer)
CompTia Network + (Ebryx CSIRT Trainings)
NUS & SingTel Lab, Singapore 11/2018 – 04/2019 CompTia Security + (Ebryx CSIRT Trainings)
Cyber Security Researcher GIAC (Comprehensive Packet Analysis)
Worked as an Info-Sec Researcher on a collaborative IoT SANS SEC-556 training
security research project at National University of Singapore & GIAC GSEC (Security Essentials)
Singtel Cyber Security R&D lab in Singapore. Participated in
SANS SEC-401 training
research for a new security protocol using mbTLS to provide an
GIAC GCIA (Intrusion Detection In-Depth)
expressive In-Network Security Orchestration for enterprise.
SANS SEC-503 training
Lenovo/Motorola, Beijing 09/2016 – 11/2018 GIAC GMON (Continuous Security Monitoring)
Information Security Engineer SANS SEC-511 training
Worked as Sr. NOC Engineer and supervised NOC engineers in
IT NOC (Motorola). Later transferred to SOC (Lenovo) and
took part in deployment of OSSEC for security monitoring,
effective threat detection & incident response.