Shaikh Jamal Uddin

Job function
Senior Information Security Consultant
Company size
51-200 Employees
Tech Services Company
Years of experience
10+ years
Company name
Secure Coat
Since Mar 2017,
Shaikh Jamal Uddin's postings have been viewed
133 times
on IT Central Station.

Shaikh Jamal Uddin is a computer and cyber security expert and has done B.S. in Computer Engineering as well as CPTE, CEH, ECSA, Rapid7: NCA (Nexpose), Rapid7: MPCS (Metasploit), IBM QRadar Certified, TCSE (TrendMicro), KLCC (Kaspersky), MCSA, MCITP professional certifications. Recently, he got Cisco Global CyberSecuirty Scholarship which will assist him to work with Cybersecurity Analysts within Security Operations Center (SOC). He found SQL injection vulnerability at NASA website, Clickjacking vulnerability at BarracudaLabs and XSS vulnerability at Microsoft. Jamal has over 12 years of information security, privacy, system, compliance and industry security risks hands-on experience.

Jamal is addicted to Infosec and is trying to support to the community by adding a defending companies in today’s evolving threat environment and always ready to quest of challenging assignments in Information Security. He is currently working as Information Security Lead Consultant at Trillium Infosec Systems, a managed cybersecurity services provider and creator of a wide range of cybersecurity solutions. He executes leading-edge security consulting and works in research and development as a cybersecurity expert to progress the state of the art in information security. Before Trillium Jamal has been actively involved in penetration testing projects.

Jamal has a proven track record of building out Information Security Management Systems, enabling enhanced integration, Automation, Vulnerability (Risk) assessment Solutions, Gap Analysis, Security operations Center, investigated Hacker Methodology using Cyber Kill Chain model in CyberFraud, Access control, Endpoint Security, Encryption, Patch management, application whitelisting, File integrity Monitor solution to track any unauthorized modification, investigated the strengths and weaknesses of (applications, security architectures, and network devices), enforce security policies, and IBM QRadar SIEM Solution.