You are on page 1of 7

Sohail Sajid (US Citizen)

Cyber Security Engineer


Email ID: sohailcyberguy@gmail.com
PH: 571-3905422

Professional Summary:

 Around 9 years of experience as Cyber security Specialist with Vulnerability and Penetration Test Engineer in
various Domains such as Web Application/Thick Client Security Testing, Vulnerability Assessment, and generating
reports using tools.
 Cyber Security Specialist with experience in: external and internal Security Assessments, Penetration Testing,
Vulnerability Assessment, Gap Analysis and Risk Assessment.
 Lead, and managed the Cyber Integrity Center SOC team supporting the 24/7/365 SOC that monitors intrusion
detection systems working with Splunk SIEM engineers, remediation Team, and Threat Intelligence Team
 Created SOP for the intrusion detection process and identified new metrics tied to key points in the process, with the
goal of reducing time of infection to time of remediation
 Created a weekly (sometimes every other day) “learning Briefing” that was designed to share new insights into new
malicious code, how to look for new or emerging attacks.
 Providing onsite Symantec DLP technical service and support to a Large Enterprise customer base.
 Developed an out-of-band capability using a virtual machine for analysts to use by going to suspected malicious
sites and record the interaction, like registry changes, system call-backs, or downloading software to confirm the
event was positive and provide the evidence to the Level III analysts and the forensics team
 Developed specific Use Cases for potential cyber attacks
 Developed key metrics for process improvement for all 4 teams listed above
 Creates effective security event notifications through increased communication Identified strong performers in the
group and designated shift leads, assigning additional duties that included monitoring and mentoring the
performance of shift personnel
 Expert in Implementing & managing Symantec tools like Data Loss Prevention (DLP) and Secure Web Gateway
( ProxySG ).
 Monitored and detected Network Vulnerabilities, Application Security Vulnerabilities, Viruses and Penetration
Attempts to Confidential computer networks located in 86 countries. Evaluated for Confidential Top 10
vulnerabilities and the Treacherous 12 Cloud Computing Top Threats. Deployed and monitored the security of the
infrastructure. Performed Malware Analysis and removal
 Responsible for SOC operations in 24x7 enviroment.
 Experience in Threat Modeling during Requirement gathering and Design phases
 Experienced SIEM Engineer and Splunk Analyst with more than eight years of IT experience with a focus on
designing, deploying and analysing security solutions.
 Experience in Security Incident handling, SIEM using Splunk and IBM Q - radar products
 Involved in Integration of Q-radar SIEM with RSA Envsion, Splunk and HP Arc Sight.
 Project involves security event monitoring, analysis, triage incident alerting and reporting using Q-radar, Splunk,HP
Arc Sight and more SIEM tools.
 Managing Security tools DLP, SIEM, Vulnerability scanner, and ServiceNow Security Operation and Penetrations
test.
 Knowledge on cleaning up log auto-discovered sources in Q-radar by identifying duplicates, correcting mis-
identified log sources, and identifying log sources from their logs.
 Expert Understanding to develop the complex Use Cases, Universal device support Modules on the Q-radar SIEM
 Proven ability in identifying various network security vulnerabilities and explain in detail how to remediate the
identified vulnerabilities.
 Strong troubleshooting, reasoning, problem-solving skills, flexible and able to deliver quality results.
 Hands-on experience writing correlation rules based on business use cases independently.
 Experience in developing the complex Use Cases, Universal device support Modules (UDSM) for non-supportable
logs on the Q-radar SIEM.
 Hands - on experience in developing threat modeling, security controls, threat analysis, creation of risk control
matrices and risk mitigation strategies
 Good experience in handling security incident response.
 Experience developing strategic plans for agency-wide implementation to address the operations of client services,
product support, and quality assurance.
 Expertise in conducting investigations of Security violations and breaches and recommending solutions; preparing
reports on intrusions as necessary and providing analysis summary to management.
 Proven ability in identifying various network security vulnerabilities and explain in detail how to remediate the
identified vulnerabilities.
 Maintained up-to-date procedures and documentation to support IT security processes.
 Strong troubleshooting, reasoning, problem-solving skills, flexible and able to deliver quality results.
 Monitored and responded to network intrusions and vulnerability alerts raised by automated detection systems,
internal and external reports and manual investigation, using tools such as snort IDS.
 Expertise in conducting investigations of Security violations and breaches and recommending solutions; preparing
reports on intrusions as necessary and providing analysis summary to manage

Technical Skills:

Qualys Continuous Monitoring: Vulnerability Management, Web Application Scanning, ThreatProtect, Policy
Compliance, Cloud Agents, Asset Management, Governance, Risk Management and Compliance.
Event Management: RSA Archer, Blue Coat Proxy, Norse, Splunk, CyberArk, NTT Security, LogRhythm.
PenTest Tools: Metasploit, NMAP, Wireshark and Kali.
Security Software: Nessus, Ethereal, NMap, Metasploit, Snort, BASE.
Frameworks: NIST SP 800-171, ISO 27001/31000, HIPPA, HITRUST CSF, PCI DSS.
Security Technologies: WhiteHat Web Security, iDefence, NTT Security, LogRhythm., McAfee Nitro (SIEM),
McAfeeePO, McAfee EndPoint Protection Suite,
Switches: Cisco Catalyst VSS 1440 / 6513 / 6509 / 4900 / 3750-X / 2960.
Routers: Cisco Routers ASR 1002 / 7606 / 7304 / 7206 / 3945 / 2951 / 2600.
Firewalls: Check Point, ISA 2004/2006, Palo Alto PA 3000/5000.
Networking: Conversant in LAN, WAN, Wi-Fi, DNS, WINS, DHCP, TCP/IP, ISCSI, Fiber, Firewalls/IPS/IDS.
Routing: OSPF, EIGRP, BGP, RIP-2, PBR, Route Filtering, Redistribution, Summarization, Static Routing.
Switching: VLAN, VTP, STP, PVST+, RPVST+, Inter VLAN routing & Multi-Layer Switching, Multicast operations,
Layer 3 Switches, Ether channels, Transparent Bridging.
Protocols: TCP/IP, L2TP, PPTP, IPSEC, IKE, SSL, SSH, UDP, DHCP, DNS.
Hardware: Dell, HP, CISCO, IBM, SUN, CheckPoint, SonicWall, Barracuda Appliances, SOPHOS email appliances
Nexus: Nexus 7010 / 5548 UP / 5020 / 2232 PP / 2248 TP / 1000 V.
UCS: Fabric Interconnect 6248/6120, IOM 2208/2204/2104, B200 M2, HP VC FLEX-10.
ANS: F5 BIG-IP LTM 6900/6400, Array APV 5200/2600/TMX 5000, Cisco CSM, CSS.
VPN: ASA 5520, Cisco Concentrator 3030, Nortel Contivity Extranet 1500.
NMS: NAM, Sniffer, Solarwinds NPM, Cisco Secure ACS 5.2, CiscoWorks.
Operating Systems: Windows, NT, Windows 98/XP/2000/2003/2007, MS-DOS, Linux.

Professional Experience:

Level1 Solution Manassas, VA (Remote) October 2019- Present


Cyber Security Engineer

 Responsible for daily Tenable Nessus Security Center Vulnerability Scans, and security findings, reports, web
application scans, ad hoc scans, and SCAP Scans.
 Develop requirements, milestones, tasks and activities, and manages stakeholder’s expectations. Conduct risk
analysis on security related issues as well as project related issues.
 Provide proactive APT hunting, incident response support, and advanced analytic capabilities
 Executed daily vulnerability assessments, threat assessment, mitigation and reporting activities to safeguard
information assets and ensure protection has been put in place on the systems.
 Oversee Vulnerability assessment / penetration testing of scoped systems and applications to identify system
vulnerabilities
 Deliver niche technology projects such as DLP and forensics to catch and prevent fraud, manage overall operational
aspect of DLP.
 Experienced with Handling Cloud environments (AWS and Cloud)
 Monitored, detected, scanned, recorded, audited, analyzed, investigated, reported, remedied, coordinated, and
tracked security-related "events" such as signs of intrusion, compromise, misuse, and compliance. Utilize provided
sensors, systems, tools to monitor networks and systems for signs of intrusion, compromise, misuse, and non-
compliance and writing security playbook writing.
 Developed threat modeling framework (STRIDE, DREAD) for critical applications to identify potential threats
during the design phase of applications
 Serve as the SOC technical lead responsible for providing analytical oversight over a team of Tier 2 and 1 SOC
analysts to monitor, detect, analyze, remediate, and report on cyber security events and incidents.
 Support security tool/application tuning engagements with the incident handler team to develop/adjust rules in
Tanium, FireEye, and Splunk which led to a significant reduction in false positive alerts.
 Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse
activities and distinguish these incidents and events from benign activities.
 Coordinate threat hunting activities across the network leveraging intelligence from multiple internal and external
sources and Splunk ES.
 Experience with Penetration Testing, DAST, SAST and manual ethical hacking.
 Monitor external data sources (e.g., cyber defense vendor sites, Computer Emergency Response Teams, Security
Focus) to maintain currency of cyber defense threat condition and determine which security issues may have an
impact on the enterprise.
 Subject matter expert (SME) for DLP, Firewall, VPN, Archer, Vulnerability Management solutions, IDS/IPS/WIPS,
SIEM and Endpoint Security.
 Provide cybersecurity recommendations to leadership based on significant threats and vulnerabilities.
 Engineering, configuring and deploying Enterprise SIEM/SEM solutions.
 Manage Splunk (SIEM) configuration files like inputs, props, transforms, and lookups. Upgrading the Splunk
Enterprise and security patching.
 Experience in Amazon AWS Cloud Administration which includes services like: EC2, S3.
 Initiated projects to create disaster recovery plans for identified gaps.
 Established disaster recovery plan testing and auditing cadence.
 Perform threat modeling of the applications to identify the threats
 Conduct network and web-based application penetration tests, physical security assessments, logical security audit,
and hands-on technical security evaluations.
 Create policies, alerts and configure using SIEM tools (Splunk )
 Assist with the development of processes and procedures to improve incident response times, analysis of incident,
and overall SOC 1 & 2.
 Assisted Intelligence Team with indicators associated with different Actor groups to combat cyber-attacks.
 Uses security measures and information collected to identify, analyze and report system events in Splunk(SIEM)
that occur within the network.
 IPS/ IDS monitoring and analysis, analyze network traffic, log analysis, prioritize and differentiate between
potential intrusion attempts and false positives.
 Monitor and analyze security event data to include investigation of reported incidents using system logs, event
correlation between Intrusion Detection Systems (IDS), Data Loss Prevention (DLP), firewalls and other means of
detection
 In-depth knowledge of penetration testing for web and mobile (iOS and Android) applications.
 Monitoring network traffic for security events and perform triage analysis to identify security incidents
 Manage Splunk(SIEM) configuration files like input, props, transforms etc.
 Have experience in cloud platform like AWS.
 Upgrading the Splunk(SIEM) Enterprise and security patching.
 Customized and fine-tuned DLP policies to reduce rate of false positives in alerts and align them with business
needs incident response. Configure PCI, SOX rules.
 Well versed in both remote and on-site user Splunk (SIEM) Support
 Centralizing the storage and interpretation of logs using Splunk(SIEM) System.
 Maintained Standard Operating Procedures (SOPs) and training documentation
 Served as the primary technical support for tier3 analyst(Security patching, TAC cases)
 Tested new security tools/products and make recommendations of tools to be implemented in the SOC environment.
 Monitored Security Management Console for Security Operation Centre (SOC) for ensuring confidentiality,
Integrity and Availability of Information systems.
 Developed threat modeling framework (STRIDE, DREAD) for critical applications to identify potential threats
during the design phase of applications
 Work on task assigned by leadership that involves coordination with other departments.
 Create procedures and Knowledge Base documents
 Responsible for development, testing, and management of SOC use cases and formulating run books for the Tier 2
and Tier 1 teams.
 Skilled using tools like Automatic Scanner, NMAP, Dirbuster, Qualysguard, Nessus, HP Fortify, HP Webinspect,
IBM appscan for web application penetration tests and infrastructure testing. 
 Delivering comprehensive prevention, detection and response status using FireEye, Symantec, and Qualys software.
 Conduct proactive monitoring, investigation, and mitigation of security incidents
 Analyze security event data from the network (IDS, SIEM).
 Perform static malware analysis on isolated virtual servers
 Recognize potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and
analyses of relevant event detail and summary information.
 Ensure the integrity and protection of networks, systems, and applications by technical enforcement of
organizational security policies, through monitoring of vulnerability scanning devices.
 Research new and evolving threats and vulnerabilities with potential to impact the monitored environment
 Conduct log analysis using Splunk
 DLP Profile deployment report for detecting servers and Update DLP policies - Incident Analysis.
 Ensures the integrity and protection of networks, systems, and applications by technical enforcement of
organizational security policies, through the performance of formal Risk Assessments, Policy and Governance, and
internal Threat Analysis in regards to a SOC environment, with the use of siem tool
 Identify suspicious/malicious activities or codes.
 Worked in a 24x7 Security Operations Center
 Monitoring and analysis of security events to determine intrusion and malicious events.
 Search firewall, email, web or DNS logs to identify and mitigate intrusion attempts.
 Investigate malicious phishing emails, domains and IPs using Open Source tools and recommend proper blocking
based on analysis.
 In-depth internal and external network penetration tests
 Experienced with Symantec DLP Policies (DLP templates) compliance and regulation standards such as SOX, PCI,
and HIPAA.
 Conduct senior level log analysis, proactive monitoring, mitigation, and response to network and security incident
 Configured security tools and writing security play books and many table top
 Performed threat monitoring - monitor industry resources and observe new technical developments, intruder
activities and related trends to help identify threats to the Client systems.
 Performed patching and vulnerability scanning and network discovery
 Tracked and resolved security non-compliance issues and patch advisories) (Plain of Action).
 Provided trend analysis for correlated information sources and network data including event logs, IDS, and network
captures.
 Provided trend analysis for correlated information sources and network data including event logs, IDS, and network
captures.
 Utilized Splunk SIEM/ArcSight daily to upkeep and identify any common threat. Reported to document security
incidents that occurred during my shift

Phaseone CG || Herndon, VA October 2017 – October 2019


Cyber Security Engineer

 Identifies security risks, threats and vulnerabilities of networks, systems, applications and new technology initiatives
 SOC Lead for integration of CISCO Sourcefire IPS with QRadar by using Estreamer Protocol.
 Triage security events and carry out incident response steps
 Provided support in identifying malicious network activity, threats impacting network operations and developing
appropriate countermeasures, eliminating network threats and vulnerabilities.
 Collecting data on Attacks to help SOC engineers create reports for auditing purposes.
 Continuously monitors levels of service as well as interprets and prioritizes threats through use of intrusion
detection systems, firewalls and other boundary protection devices, and any security incident management products
deployed
 Worked on Symantec DLP Product Versions Report, Client Online Status by Group Report.
 Provided real time intrusion detection host based monitoring services using Symantec DLP and EndPoint
 Conduct external, internal, wireless, and segmentation penetration testing for clients in their Payment Card Industry
(PCI) environments. 
 Identify Security requirements, feasibility of various Cloud based solution providers to meet FedRAMP/FISMA
compliance for USAID.
 Conduct Security assessment and customization for Cloud service Software-as-a-Service SaaS built on Amazon
EC2 infrastructure.
 Write Security test plans, and SA A artifacts for cloud based solutions.
 Integration of different devices/applications/databases/ operating systems with QRadar SIEM.
 QRadar SIEM v7.2 Administration with SIEM EPS tuning, distributed deployment architectures
 Part of deployment team where parsing several Log sources are integrated into QRadar through mid-layer such as
F5 for PCI and Syslog services.
 Performed penetration testing for external facing web applications. Security areas covering DMZ architecture, threat
modeling, secure coding practices (i.e., OWASP standards) and vulnerability analysis were assessed
 Migrating existing Reports and Alerts from RSA envision to IBM Qradar.
 Tuning, Configuration, False Positive Reduction, Custom Log Source Extension development and administration of
QRadar.
 Skilled using Burp Suite, Acunetix Automatic Scanner, NMAP, DirBuster for web application Penetration  tests. 
 Aggregate, correlate, and analyse log data from network devices, security devices and other key assets using Qradar.
 Responsible for Incident handling and response, with knowledge of common probing and attack methods, viruses,
botnets and other forms of malware. Correlating events from a Network, OS, Applications or IDS/Firewalls and
analysing them for possible threats.
 Worked on Data Loss Prevention suit, Symantec DLP Product - Implementation and deployment as the Confidential
team.
 Monitoring network traffic, network-based Intrusion Detection System and firewalls
 Ensure the SOC analyst team is providing excellent customer service and support.
 Designed SOA based data service (for data domain) serving master data to authorized systems.
 Monitors agencies sensors and SOC (Security Operation Center) systems for incidents and malicious activity.
 Executed daily vulnerability assessments, threat assessment, and mitigation and reporting activities in order to
safeguard information assets and ensure protection has been put in place on the systems.
 Performing security analysis and identifying possible vulnerabilities in eliciting the key derivation function, create
Vulnerability Assessment report detailing exposures that were identified, rate the severity of the system &
suggestions to mitigate any exposures & testing known vulnerabilities.
 Gained experience with Symantec DLP Software: DLP Cloud Prevent for Microsoft Office 365, DLP.
 Cyber Security skilled with Incidence Response and Handling, Security Operation Centre(SOC), Firewall
Operations, Risk Management, Malware Analysis, Intrusion Detection and Prevention System (IDS/IPS), Web
Application Security, Unauthorized Access, Viruses and a wide range of Vulnerabilities and Threats.
 Application security area (former developer) with extensive experiences in Secure SDLC integration and
Implementation, vulnerability Assessment through threat modeling, dynamic and static code analysis including, but
not limited to manual code reviews to ensure proactive approach to web app. security mitigations.
 Conduct log analysis, proactive monitoring, mitigation, and response to network and security incident. Analyse
security event data from the network (IDS sensors, firewall traffic).
 Administrative Office 365 (Exchange Online, SharePoint Online, and skype for business (Lync))
 Setup and manage alerts to monitor activity on business critical information as required.
 Develop custom applications using InfoPath and other Out of the Box SharePoint features and functionality.
 Provided second level support for the Symantec Endpoint Protection Antivirus System Provided after-hours support
for the Production environment, generated and provided documented reports for the Threat Remediation
Management Team.
 Experience configuring, implementation and deploying McAfee modules and products like McAfee ePO (End Point
Orchestrator), McAfee VSE, McAfee HIPS, McAfee Endpoint Encryption, McAfee Network DLP, McAfee DLP
Endpoint, McAfee SIEM.
 Worked with Symantec DLP and assessed and built a data protection program through data classification skills and
a clear understanding of privacy standards and regulation.
 Cyber security & Information Assurance with deep Knowledge of Identity and Access Management security, Sail
point Identity IQ, Access Control issues related to cyber systems and networks, AWS Cloud, Penetration testing
methodology, malware detection techniques, recommended information assurance policies and standards.
 Incident response and threat detection using Tanium
 Put together E-Business Operations documentation for the Symantec Endpoint Protection Management
environment.
 Implemented and configured firewall changes within the Symantec Protection environment according to Internal
Compliance approved Specifications/recommendations.
 Responsible for maintaining availability, reporting and communication of the SIEM between it, its event-sources
and the endpoints.
 Responsible for the management, design, and dissemination of relevant data from the global security information
and event management (SIEM) system.
 Assisted in designing, implementing and evaluating applications, systems and utilities relevant to Active Directory
services.
 Perform static and dynamic malware analysis on virtual servers with proper documentation and steps for removal on
infected systems. .
 Experienced on configuration, installation, and patches upgrades of Tripwire Log Centre on windows environment.
 Interacts with end users, including first responders and explosive experts, identifying and aligning user needs with
Tripwire resources.
 Experience with Firewall Administration, Rule Analysis, Rule Modification.
 Recognizes potential, successful, and unsuccessful intrusion attempts and compromises through analysis of relevant
event logs and supporting data sources. Utilized Sourcefire, Wireshark.

Comcast Dallas, Tx March 2015 to June 2017


SOC Engineer

 Established vulnerability assessment practice, proactively ensuring safety of Client-facing applications and
minimizing client audit findings.
 Assisted in monitor and maintain server systems. Install server hardware and operating systems.
 Participated in the product selection and installation of QRadar Security Information Event Manager SIEM
consisting of multiple collectors and a high-performance MS SQL database
 Designed and implemented enterprise SIEM systems: centralized logging, NIDS, alerting and monitoring,
compliance reporting, based on QRadar 7.0 SIEM.
 Strong knowledge and experience in Symantec DLP workflow & architecture
 Assist with the development of processes and procedures to improve incident response times, analysis of incidents,
and overall SOC functions.
 Assisted with applications/tools including but not limited to SIEM, Wireshark, Intrusion detection Systems (IDS),
Data loss prevention controls (DLP), e-mail gateway protection, VPN operations
 Developed a simplified Global Threat modeling tool with security controls that are based on system and operating
environment
 Responsible for QRadar SIEM monitoring and configuration aligned to internal PCI and SOX controls
 Manage the day-to-day log collection activities of source devices that send log data to SIEM QRadar.
 Cleaning up log sources auto-discovered in QRadar by identifying duplicates, correcting mis-identified log sources,
and identifying log sources from their logs.
 DLP Profile deployment report for detecting servers and Update DLP policies - Incident Analysis.
 Ensure products and systems comply with cyber security standards and practices. Develop test routines and
monitoring solutions. Penetration testing using Nmap and Wireshark.
 Configuration trouble shooting on SIEM for data sources.
 Dashboard / Enterprise dashboard customization for various teams based on the log source type requirements.
 Experienced in Operations Center environment team such as: Computer Emergency Response Team (CERT),
Computer Incident Response Team (CIRT)
 Supported for Security Operations Center (SOC). Monitor security system and diagnoses malware events to ensure
no interruption of service. Identify potential threat, anomalies, and infections and provide report to the customers
 Ensures that security assessments are conducted early in the definition, design and development phases to ensure
that security requirements are captured and properly addressed through security requirements definition, threat
modeling and static analysis.
 Experienced with Symantec DLP Policies (DLP templates) compliance and regulation standards such as SOX, PCI,
and HIPAA.
 Analyze network traffic by means of monitoring/detecting, research, and forensics to identify malicious activity
 SIEM troubleshooting and processing assigned enhancement request for various SIEM issues.
 Access control for browsing, Authentication for all hits from browsing on proxy servers, maintenance of proxy logs
for forensic purpose
 Manual and Dynamic penetration testing of web applications using Burp Suite and AppScan
 Identifies, validates and documents substation asset classifications. Maintains substation asset tracking systems and
databases as well as the credential management system.
 Collecting data on Attacks to help SOC 1 & 2 engineers create reports for auditing purposes.
 Serves as a team member that properly prepares for and address incidents across the organization, a centralized
incident response team is formed and is responsible for analysing security breaches and taking any necessary
responsive measures.
 Implementation, configuration and support of Checkpoint and ASA firewalls for clients.
 Understanding the whole network & requirement of the organization.
 Reverse-engineer found malware to create content for various detection tools including: Snort, TippingPoint,
NetScreen, and BlueCoat to better facilitate future detection and prevention
 EPS calculation and storage calculation as per compliance.
 Understanding of various OS, web, database and application servers and respective integration mechanism.
 Define logging as per customer’s requirement.
 Perform web application and infrastructure penetration tests
 Integration of different data sources like Linux servers, windows servers, web servers, databases, security controls,
network elements.
 Responsible for end device configuration to push / pull logs to/from SIEM receivers.
 Fine tuning of default rules, reports and alarms.

AIG Dallas, Tx March 2012 to December 2014


Security Engineer

 Maintains records of security monitoring and incident response activities, utilizing case management and ticketing
technologies
 Maintains records of security monitoring and incident response activities, utilizing case management and ticketing
technologies
 Administrative duties monitoring Outlook email using Cisco IronPort security
 Monitoring of security events in the SIEM, as well as other security feeds, and communications (email, phone, chat,
and other communications.
 Analyze network traffic by means of monitoring/detecting, research, and forensics to identify malicious activity
 Reviewed client mobile applications for security compliance, with a focus on malware and potentially harmful
behavior.
 Security incidents to provide management oversight to the incident process.
 Perform tuning of the Security Incident and Event Manager (SIEM) filters and correlations to continuously improve
monitoring
 Triage security alerts and events.
 Utilized tools such as, Kali Linux, Metasploit Pro, Cobalt Strike, Nessus and Burp Suite to detect and exploit
vulnerabilities.
 Manage IDS/IPS systems as well as handled incident response.
 Discovered methods and implemented strategies to target specific networks, computer systems, specific hardware or
software.

EDUCATION:

Bachelors in Commerce and Business Administration 2010 Punjab University Lahore,

Professional Certification:

 Network +
 CompTIA Security+
 Certified Ethical Hacker
 Salesforce Administrator
 Salesforce Certified Platform Developer I and II

You might also like