Shaikh Jamal Uddin

Job function
Information Security Lead Consultant
Company size
51-200 Employees
Industry
Tech Services Company
Years of experience
10+ years
Company name
Secure Coat
Since Mar 2017, Shaikh Jamal Uddin's postings have been viewed 283 times on IT Central Station.
Bio

Shaikh Jamal Uddin is a computer and cyber security expert and has done B.S. in Computer Engineering as well as CPTE, CEH, ECSA, Rapid7: NCA (Nexpose), Rapid7: MPCS (Metasploit), IBM QRadar Certified, TCSE (TrendMicro), KLCC (Kaspersky), MCSA, MCITP professional certifications. Recently, he got Cisco Global CyberSecuirty Scholarship which will assist him to work with Cybersecurity Analysts within Security Operations Center (SOC). He found SQL injection vulnerability at NASA website, Clickjacking vulnerability at BarracudaLabs and XSS vulnerability at Microsoft. Jamal has over 12 years of information security, privacy, system, compliance and industry security risks hands-on experience.

Jamal is addicted to Infosec and is trying to support to the community by adding a defending companies in today’s evolving threat environment and always ready to quest of challenging assignments in Information Security. He is currently working as Information Security Lead Consultant at Trillium Infosec Systems, a managed cybersecurity services provider and creator of a wide range of cybersecurity solutions. He executes leading-edge security consulting and works in research and development as a cybersecurity expert to progress the state of the art in information security. Before Trillium Jamal has been actively involved in penetration testing projects.

Jamal has a proven track record of building out Information Security Management Systems, enabling enhanced integration, Automation, Vulnerability (Risk) assessment Solutions, Gap Analysis, Security operations Center, investigated Hacker Methodology using Cyber Kill Chain model in CyberFraud, Access control, Endpoint Security, Encryption, Patch management, application whitelisting, File integrity Monitor solution to track any unauthorized modification, investigated the strengths and weaknesses of (applications, security architectures, and network devices), enforce security policies, and IBM QRadar SIEM Solution.


Sign Up with Email