Logo FreelancerComment cela fonctionneParcourir les emplois Se connecter S'inscrire Publier un projet
EXPLORER
Computer Security Linux Network Administration System Admin Web Security
Profile cover photo
Vous suivez désormais .
Erreur de suivi de l'utilisateur.
Cet utilisateur n'utilise pas les utilisateurs à le suivre.
Vous suivez déjà cet utilisateur.
Votre plan d'adhésion ne permet que 0 suivis. Améliorez ici.
L'utilisateur n'est désormais plus suivi.
Erreur lors de l'arrêt du suivi de l'utilisateur.
Vous avez désormais recommandé
Erreur lors de la recommendation de l'utilisateur.
Une erreur a eu lieu. Veuillez rafraîchir la page et réessayer.
E-mail désormais vérifié.
Avatar de l'utilisateur
$25 USD / heure
Drapeau de PAKISTAN
gujrat, pakistan
$25 USD / heure
Il est actuellement 6:20 PM ici
Membre depuis le septembre 21, 2020
2 Recommandations

Umer S.

@FutureNOWPK

monthly-level-three.svg
4,9 (30 commentaires)
5,3
5,3
$25 USD / heure
Drapeau de PAKISTAN
gujrat, pakistan
$25 USD / heure
92 %
Travaux complétés
90 %
Suivant le budget
69 %
Dans les temps
23 %
Taux de réembauche

Linux | Reverse Engineering | Data Forensics

Trust | Reliability | Fair Value The values I live by. I am a Linux and Windows support professional. I like to work Security challenges and forensic assignments. I am very likely to pick up interesting projects on Linux that involve research around OpenNDS, OpenWRT, RaspberryPi, Data Extraction/Exfil. I am a supporter and promoter of Linux for security and desktop OS adoption. I do provide security enumeration, penetration testing and hardening and currently I focus on Reverse Engineering as core area of my work. Interestingly, I also have CISA, CISM and CDPSE (exams) certification and based on that, I help people with audit reports and presentations. For windows users, I can strengthen your system against malware and Ransomware. When I am not having any fun, I use my IELTS band 8 to produce great articles, procedure documents, policies and blogs. Get in touch and we will mutually explore the possibilities of what we can achieve. I have had opportunity to work with great employers like British Council, Arabian Group and now ISACA. Here's what you will find here Professional standards, confidentiality and ethics Linux and Windows expertise Penetration testing assignments Digital forensic assignments IS Audits/ Reports Policy and Procedure documentation Rapid prototypes of Web sites Thank you for visiting my profile. Also Watch an Explainer video [login to view URL] #Explainer #Video [login to view URL] - Great Concept #Website design for #Clothing and #Apparel Outfit #Website Concept [login to view URL] - Awesome Concept #Website design for #CarRental and #Tourism Operators Website [login to view URL] - Flexible concept #Website design for #Clothing and #Apparel #Outfit Website Concept [login to view URL] - A detailed concept #Website design for #NGO, #Healthcare organizations, #hospitals, #Clinics. [login to view URL] - Massive concept #Website design for #Architects, #Home #builders, #Property and #RealEstate Agents
Freelancer Network Administrators Pakistan

Contactez Umer S. concernant votre emploi

Connectez-vous pour discuter des détails via la messagerie.

Éléments du portfolio

Ransomware is one of the rising threats, alongside Business Email Compromise or BEC. They make up a large portion of cyber attacks on home, business and industries. I have a carefully selected set of techniques and tools that put many layers of defense around data that any one, everyone of us needs for their life, progress, integrity and even accountability.

Join the fight with me

FutureNOW
Ransomware Defense Techniques
Ransomware is one of the rising threats, alongside Business Email Compromise or BEC. They make up a large portion of cyber attacks on home, business and industries. I have a carefully selected set of techniques and tools that put many layers of defense around data that any one, everyone of us needs for their life, progress, integrity and even accountability.

Join the fight with me

FutureNOW
Ransomware Defense Techniques
Ransomware is one of the rising threats, alongside Business Email Compromise or BEC. They make up a large portion of cyber attacks on home, business and industries. I have a carefully selected set of techniques and tools that put many layers of defense around data that any one, everyone of us needs for their life, progress, integrity and even accountability.

Join the fight with me

FutureNOW
Ransomware Defense Techniques
Post COVID-19 worklife allowed office workers to use home devices which gave cyber criminals great opportunities to exploit worker's comfort. With unprecedented sensitive work, financial transaction, online ordering made using devices with legacy protection, an exploitation was inevitable. We offer following protection through this Freelancer.com in these use cases:

Home Device Users
 - Devices used for processing media by students and teachers
 - Devices used by family members for browsing the internet before making online purchases
 - Devices used to collaborate via Emails, Social Media
(SOHO) and Mid to large Businesses with extensive IT including IoT Devices

Cyber criminals do not have a humane connection with victims and following is how they destroy lives of victim The chances of recovering stolen or encrypted data is very grim
Private data, pictures, sensitive confidential documents & information 
 - up for sale on dark web.
 - held for large ransom
 - Deletion of private
Protection for home or office devices from all type of malwa
Post COVID-19 worklife allowed office workers to use home devices which gave cyber criminals great opportunities to exploit worker's comfort. With unprecedented sensitive work, financial transaction, online ordering made using devices with legacy protection, an exploitation was inevitable. We offer following protection through this Freelancer.com in these use cases:

Home Device Users
 - Devices used for processing media by students and teachers
 - Devices used by family members for browsing the internet before making online purchases
 - Devices used to collaborate via Emails, Social Media
(SOHO) and Mid to large Businesses with extensive IT including IoT Devices

Cyber criminals do not have a humane connection with victims and following is how they destroy lives of victim The chances of recovering stolen or encrypted data is very grim
Private data, pictures, sensitive confidential documents & information 
 - up for sale on dark web.
 - held for large ransom
 - Deletion of private
Protection for home or office devices from all type of malwa
Protection for home or office devices from all type of malwa
Protection for home or office devices from all type of malwa
A great concept #Website design for #Architects, #Home #builders, #Property and #RealEstate Agents Introduce your homes, showcase the features, introduce your able craftsmen, sales team, marketing team and share the values you live by. Great tool to stay on top this wedding season. Contact for details and customization.
https://www.youtube.com/watch?v=57_ZHVOwIBI
#Website design for #Architects, #Home #builders, #Property
A great concept #Website design for #Apparel and #Outfits & #Clothing shop. Whether you run your business from home, have a shop or run an e-commerce business, Introducing your #designs and your wardrobe to show the features, cloths, customer remarks and the values you live by, is a great tool to stay on top this wedding season. Contact for details and customization.
https://youtu.be/HQhLlMBLkJw
A great concept #Website design for #Apparel and #Outfit
The following website was created for an NGO, operating in Healthcare and Social Services, alongside branching out to provide IT education to underprivileged. This is the 3rd draft. Pure HTML CSS ideas from great fellow workers, and layering up with in the required order. 

https://www.youtube.com/watch?v=0AV3DUvOmoo
Web Design for a Healthcare/Social Care Organization
Summer vacations provide a challenge both for the child and the parents, as there are no set guidelines, no agreed outcomes, no performance levels regarded for these 90 days. As it has been for most of children, 90 days are spent, one day at a time with absolutely none or little contribution to his knowledge.

FutureSkillsPK believe these 90 days could be 700+ hours of pure career authoring that is no less fun than a good meet up, social hour or games as it will include all that.

Register your child for 700 hours of career authoring where he will have choices to make that will shape his future, before it is wasted. The activities include just enough study to keep them in touch with their school life, programming activities, game development, raspberryPi projects, linux, web development and more.

For a detailed chat about your child, contact us.

fb.me/futureNOW.PK
fb.me/futureskillspk
We all fear unknown, but are we afraid of the right thing?
Summer vacations provide a challenge both for the child and the parents, as there are no set guidelines, no agreed outcomes, no performance levels regarded for these 90 days. As it has been for most of children, 90 days are spent, one day at a time with absolutely none or little contribution to his knowledge.

FutureSkillsPK believe these 90 days could be 700+ hours of pure career authoring that is no less fun than a good meet up, social hour or games as it will include all that.

Register your child for 700 hours of career authoring where he will have choices to make that will shape his future, before it is wasted. The activities include just enough study to keep them in touch with their school life, programming activities, game development, raspberryPi projects, linux, web development and more.

For a detailed chat about your child, contact us.

fb.me/futureNOW.PK
fb.me/futureskillspk
We all fear unknown, but are we afraid of the right thing?
We all fear unknown, but are we afraid of the right thing?

Commentaires

Modifications enregistrées
Montre1 - 5 sur 30 commentaires
Filtrer les commentaires par : 5,0
$10,00 USD
True professional, can handle every task , I work with him for the second time and there is no dought
Linux Debian Raspberry Pi
Avatar de l'utilisateur
Drapeau de Amit W. @weissamit
il y a 2 mois
5,0
$50,00 USD
very good experience and understanding c/c++ and assembly, he was focused and determined more then i expected to get the job done. great understanding complexities of a complicated system.
C Programming Linux Software Architecture C++ Programming Debugging
M
Drapeau de Moshe Z. @moshezaga9
il y a 2 mois
5,0
₹1 400,00 INR
He is technically very sound and promising
Python Electronics Microcontroller Software Architecture Arduino
Avatar de l'utilisateur
Drapeau de Manoj M. @manojindore
il y a 5 mois
5,0
$50,00 USD
Umer suggested his professional help in solving a driver issue for raspberry pie , he was professional fast and showed a lot of experience all the time , good price , good support , I will definitely work with him again
PHP Linux MySQL Web Hosting
+1 de plus
Avatar de l'utilisateur
Drapeau de Amit W. @weissamit
il y a 5 mois
5,0
$65,00 USD
Umer is honest and straight forward person. Very helpful and comfortable to work with. The best person to get your job done on time.
Cisco Network Administration Network Engineering
C
Drapeau de Charles W. @charles932
il y a 5 mois

Expérience

Membership Affairs

ISACA - Lahore Chapter
avr. 2017 - Jusqu'à présent
I take care of the membership pool and help conduct seminars on various topics. Seminars Conducted on RANSOMWARE - 2019 ISACA Lahore - 2019

Consultant Cyber Security

(Confidnetial - Rubber Product Exporter)
oct. 2022 - janv. 2023 (3 mois, 1 jour)
As a consultant analyzed a breach with potential to "reroute" 150K USD in a BEC (Business email compromise) attack. Unidentified cyber assailant. Web/email cPanel:GODADDY. In-built 'security' allowed open web sessions. Hacker added himself to Domain forwarder list and listened to "Approve payment". I added the "Payment approvals", got breach timeline using Logs, (Linux, Regex, Grep, iftop), proposed Email migration, Disabled firewall, Activated SSL, Secured desktops to avoid more breach.

Regional Manager for IT

British Council MENA
déc. 2002 - nov. 2011 (8 ans, 11 mois)
1st and 2nd level support for 9000 MS Win/Exchange users. Virtualized half the continent, traveled 2 continents. Optimized backup jobs, service contracts, system parameters. You name it. Since 2014, I've developed an affection and a flare for Linux. So I switched. Now I only use Linux, both for fun and business. That's what i'll tell you to do too. Facing any problems with your Linux distro? We can work together to a solution.

Éducation

Masters in CS

Foundation University, Pakistan 1998 - 1999
(1 an)

Bachelors in CS

Foundation University, Pakistan 1993 - 1995
(2 ans)

Qualifications

CDPSE - Exam

ISACA Global
2021
Cleared the Certified Data Privacy Solutions Engineer by ISACA, a certification focusing on engineering Privacy oriented solutions.

ITIL

AXELOS
2008
ITIL V3 Foundation

Prince II Practitioner

AXELOS
2011
Projects in Controlled Environments Certified Fouindation

Contactez Umer S. concernant votre emploi

Connectez-vous pour discuter des détails via la messagerie.

Vérifications

Freelance préféré
Identité vérifiée
Paiement vérifié
Téléphone vérifié
E-mail vérifié
Connecté à Facebook

Meilleures compétences

Network Administration 14 System Admin 13 Linux 13 Web Security 13 Computer Security 12

Parcourir les freelances similaires

Network Administrators in Pakistan
Network Administrators
System Administrators
Linux Developers

Parcourir les présentations similaires

Network Administration
System Admin
Linux
Web Security
Utilisateur précédent
Utilisateur suivant
Invitation désormais envoyée !
Utilisateurs enregistrés Total des travaux publiés
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)
Copyright © 2023 Freelancer Technology Pty Limited (ACN 142 189 759)
Chargement de l'aperçu
Permission donnée pour la géolocalisation.
Votre session de connexion a expiré et vous avez été déconnecté. Veuillez vous connecter à nouveau.