Cybersecurity specialist with a foundation in Computer Science and a focus on information security and IT administration.
Holding an MSc in Computer Science with Cybersecurity specialization from SRH Berlin University of Applied Sciences and a BTech in Computer Science and Engineering. My academic journey has equipped me with deep knowledge in system security principles, network defense strategies, and information security management.
With experience spanning across multiple organizations including Bruker Daltonics in Germany, Instore Masters Worldwide in India/Qatar, and Almanasoft WLL in Qatar, I have developed expertise in ISO 27001 audits, ISMS risk management, and enterprise-wide security implementation.
My technical skill set includes proficiency in multiple programming languages, experience with major cloud platforms, and administration of enterprise systems including Atlassian Suite, MS 365, and Google Workspace. I maintain a comprehensive understanding of cybersecurity best practices and emerging threats.
To leverage my cybersecurity expertise to protect critical infrastructure and sensitive data from increasingly sophisticated threats in our digital world. I aim to bridge the gap between technical security implementation and business objectives, ensuring organizations can innovate safely in the digital landscape.
I approach security challenges with methodical analysis, identifying vulnerabilities through comprehensive assessment before implementing targeted solutions.
Rather than merely reacting to threats, I focus on anticipating security challenges and implementing preventative measures to maintain strong security postures.
I believe in cross-functional collaboration, working with stakeholders across organizations to develop security solutions that align with business goals.
My security recommendations are backed by data analysis and empirical evidence to ensure resources are allocated to address the most significant risks.
"In the realm of cybersecurity, the most effective defense is one that anticipates the threats of tomorrow while addressing the vulnerabilities of today."
Specialized in advanced cybersecurity techniques, network defense strategies, and information security management systems.
Focused on foundational computer science principles, software development practices, and IT systems administration.
Led a comprehensive cybersecurity workshop focusing on ethical hacking techniques, vulnerability assessment, and penetration testing methodologies.
Developed a secure inventory management application with role-based access control, encrypted data storage, and comprehensive audit logging.
Created an AI-powered chatbot implementing secure data handling practices, privacy-by-design principles, and natural language processing.
Led a comprehensive cybersecurity workshop focusing on ethical hacking techniques, vulnerability assessment, and penetration testing methodologies.
Developed a secure inventory management application with role-based access control, encrypted data storage, and comprehensive audit logging.