Freelancer -logo Kuinka se toimii Selaa töitä Kirjaudu sisään Rekisteröidy Ilmoita projekti
LÖYDÄ
Computer Security Linux Network Administration System Admin Web Security
Profile cover photo
Seuraat nyt käyttäjää .
Virhe seurattaessa käyttäjää.
Tämä käyttäjä ei salli käyttäjien seurata häntä.
Seuraat jo tätä käyttäjää.
Jäsenyystasosi mahdollistaa vain 0 seurausta. Päivitä tästä.
Poistit käyttäjän seurannan onnistuneesti.
Virhe poistettaessa käyttäjän seurantaa.
Olet onnistuneesti suositellut käyttäjää
Virhe suositeltaessa käyttäjää.
Jokin meni vikaan. Päivitä sivu ja yritä uudelleen.
Sähköposti vahvistettu onnistuneesti.
Käyttäjän avatar
$25 USD / tunti
Maan PAKISTAN lippu
gujrat, pakistan
$25 USD / tunti
Kello on tällä hetkellä 7:02 ip. täällä
Liittynyt syyskuuta 21, 2020
2 Suosittelee

Umer S.

@FutureNOWPK

monthly-level-three.svg
4,9 (30 arvostelua)
5,3
5,3
$25 USD / tunti
Maan PAKISTAN lippu
gujrat, pakistan
$25 USD / tunti
92 %
Suoritetut työt
90 %
Budjetin mukaisesti
69 %
Aikataulussa
23 %
Uudelleenpalkkausaste

Linux | Reverse Engineering | Data Forensics

Trust | Reliability | Fair Value The values I live by. I am a Linux and Windows support professional. I like to work Security challenges and forensic assignments. I am very likely to pick up interesting projects on Linux that involve research around OpenNDS, OpenWRT, RaspberryPi, Data Extraction/Exfil. I am a supporter and promoter of Linux for security and desktop OS adoption. I do provide security enumeration, penetration testing and hardening and currently I focus on Reverse Engineering as core area of my work. Interestingly, I also have CISA, CISM and CDPSE (exams) certification and based on that, I help people with audit reports and presentations. For windows users, I can strengthen your system against malware and Ransomware. When I am not having any fun, I use my IELTS band 8 to produce great articles, procedure documents, policies and blogs. Get in touch and we will mutually explore the possibilities of what we can achieve. I have had opportunity to work with great employers like British Council, Arabian Group and now ISACA. Here's what you will find here Professional standards, confidentiality and ethics Linux and Windows expertise Penetration testing assignments Digital forensic assignments IS Audits/ Reports Policy and Procedure documentation Rapid prototypes of Web sites Thank you for visiting my profile. Also Watch an Explainer video [login to view URL] #Explainer #Video [login to view URL] - Great Concept #Website design for #Clothing and #Apparel Outfit #Website Concept [login to view URL] - Awesome Concept #Website design for #CarRental and #Tourism Operators Website [login to view URL] - Flexible concept #Website design for #Clothing and #Apparel #Outfit Website Concept [login to view URL] - A detailed concept #Website design for #NGO, #Healthcare organizations, #hospitals, #Clinics. [login to view URL] - Massive concept #Website design for #Architects, #Home #builders, #Property and #RealEstate Agents
Freelancer Network Administrators Pakistan

Ota yhteyttä käyttäjään Umer S. työhösi liittyen

Kirjaudu sisään keskustellaksesi yksityiskohdista chatin välityksellä.

Portfoliokohteet

Ransomware is one of the rising threats, alongside Business Email Compromise or BEC. They make up a large portion of cyber attacks on home, business and industries. I have a carefully selected set of techniques and tools that put many layers of defense around data that any one, everyone of us needs for their life, progress, integrity and even accountability.

Join the fight with me

FutureNOW
Ransomware Defense Techniques
Ransomware is one of the rising threats, alongside Business Email Compromise or BEC. They make up a large portion of cyber attacks on home, business and industries. I have a carefully selected set of techniques and tools that put many layers of defense around data that any one, everyone of us needs for their life, progress, integrity and even accountability.

Join the fight with me

FutureNOW
Ransomware Defense Techniques
Ransomware is one of the rising threats, alongside Business Email Compromise or BEC. They make up a large portion of cyber attacks on home, business and industries. I have a carefully selected set of techniques and tools that put many layers of defense around data that any one, everyone of us needs for their life, progress, integrity and even accountability.

Join the fight with me

FutureNOW
Ransomware Defense Techniques
Post COVID-19 worklife allowed office workers to use home devices which gave cyber criminals great opportunities to exploit worker's comfort. With unprecedented sensitive work, financial transaction, online ordering made using devices with legacy protection, an exploitation was inevitable. We offer following protection through this Freelancer.com in these use cases:

Home Device Users
 - Devices used for processing media by students and teachers
 - Devices used by family members for browsing the internet before making online purchases
 - Devices used to collaborate via Emails, Social Media
(SOHO) and Mid to large Businesses with extensive IT including IoT Devices

Cyber criminals do not have a humane connection with victims and following is how they destroy lives of victim The chances of recovering stolen or encrypted data is very grim
Private data, pictures, sensitive confidential documents & information 
 - up for sale on dark web.
 - held for large ransom
 - Deletion of private
Protection for home or office devices from all type of malwa
Post COVID-19 worklife allowed office workers to use home devices which gave cyber criminals great opportunities to exploit worker's comfort. With unprecedented sensitive work, financial transaction, online ordering made using devices with legacy protection, an exploitation was inevitable. We offer following protection through this Freelancer.com in these use cases:

Home Device Users
 - Devices used for processing media by students and teachers
 - Devices used by family members for browsing the internet before making online purchases
 - Devices used to collaborate via Emails, Social Media
(SOHO) and Mid to large Businesses with extensive IT including IoT Devices

Cyber criminals do not have a humane connection with victims and following is how they destroy lives of victim The chances of recovering stolen or encrypted data is very grim
Private data, pictures, sensitive confidential documents & information 
 - up for sale on dark web.
 - held for large ransom
 - Deletion of private
Protection for home or office devices from all type of malwa
Protection for home or office devices from all type of malwa
Protection for home or office devices from all type of malwa
A great concept #Website design for #Architects, #Home #builders, #Property and #RealEstate Agents Introduce your homes, showcase the features, introduce your able craftsmen, sales team, marketing team and share the values you live by. Great tool to stay on top this wedding season. Contact for details and customization.
https://www.youtube.com/watch?v=57_ZHVOwIBI
#Website design for #Architects, #Home #builders, #Property
A great concept #Website design for #Apparel and #Outfits & #Clothing shop. Whether you run your business from home, have a shop or run an e-commerce business, Introducing your #designs and your wardrobe to show the features, cloths, customer remarks and the values you live by, is a great tool to stay on top this wedding season. Contact for details and customization.
https://youtu.be/HQhLlMBLkJw
A great concept #Website design for #Apparel and #Outfit
The following website was created for an NGO, operating in Healthcare and Social Services, alongside branching out to provide IT education to underprivileged. This is the 3rd draft. Pure HTML CSS ideas from great fellow workers, and layering up with in the required order. 

https://www.youtube.com/watch?v=0AV3DUvOmoo
Web Design for a Healthcare/Social Care Organization
Summer vacations provide a challenge both for the child and the parents, as there are no set guidelines, no agreed outcomes, no performance levels regarded for these 90 days. As it has been for most of children, 90 days are spent, one day at a time with absolutely none or little contribution to his knowledge.

FutureSkillsPK believe these 90 days could be 700+ hours of pure career authoring that is no less fun than a good meet up, social hour or games as it will include all that.

Register your child for 700 hours of career authoring where he will have choices to make that will shape his future, before it is wasted. The activities include just enough study to keep them in touch with their school life, programming activities, game development, raspberryPi projects, linux, web development and more.

For a detailed chat about your child, contact us.

fb.me/futureNOW.PK
fb.me/futureskillspk
We all fear unknown, but are we afraid of the right thing?
Summer vacations provide a challenge both for the child and the parents, as there are no set guidelines, no agreed outcomes, no performance levels regarded for these 90 days. As it has been for most of children, 90 days are spent, one day at a time with absolutely none or little contribution to his knowledge.

FutureSkillsPK believe these 90 days could be 700+ hours of pure career authoring that is no less fun than a good meet up, social hour or games as it will include all that.

Register your child for 700 hours of career authoring where he will have choices to make that will shape his future, before it is wasted. The activities include just enough study to keep them in touch with their school life, programming activities, game development, raspberryPi projects, linux, web development and more.

For a detailed chat about your child, contact us.

fb.me/futureNOW.PK
fb.me/futureskillspk
We all fear unknown, but are we afraid of the right thing?
We all fear unknown, but are we afraid of the right thing?

Arvostelut

Muutokset tallennettu
Näytetään 1 - 5 / 30 arvostelua
Suodata arvosteluja: 5,0
$10,00 USD
True professional, can handle every task , I work with him for the second time and there is no dought
Linux Debian Raspberry Pi
Käyttäjän avatar
Maan  lippu Amit W. @weissamit
•
2 kuukautta sitten
5,0
$50,00 USD
very good experience and understanding c/c++ and assembly, he was focused and determined more then i expected to get the job done. great understanding complexities of a complicated system.
C Programming Linux Software Architecture C++ Programming Debugging
M
Maan  lippu Moshe Z. @moshezaga9
•
2 kuukautta sitten
5,0
₹1 400,00 INR
He is technically very sound and promising
Python Electronics Microcontroller Software Architecture Arduino
Käyttäjän avatar
Maan  lippu Manoj M. @manojindore
•
4 kuukautta sitten
5,0
$50,00 USD
Umer suggested his professional help in solving a driver issue for raspberry pie , he was professional fast and showed a lot of experience all the time , good price , good support , I will definitely work with him again
PHP Linux MySQL Web Hosting
+1 enemmän
Käyttäjän avatar
Maan  lippu Amit W. @weissamit
•
5 kuukautta sitten
5,0
$65,00 USD
Umer is honest and straight forward person. Very helpful and comfortable to work with. The best person to get your job done on time.
Cisco Network Administration Network Engineering
C
Maan  lippu Charles W. @charles932
•
5 kuukautta sitten

Kokemus

Membership Affairs

ISACA - Lahore Chapter
huhtik. 2017 - Voimassa
I take care of the membership pool and help conduct seminars on various topics. Seminars Conducted on RANSOMWARE - 2019 ISACA Lahore - 2019

Consultant Cyber Security

(Confidnetial - Rubber Product Exporter)
lokak. 2022 - tammik. 2023 (3 kuukautta, 1 )
As a consultant analyzed a breach with potential to "reroute" 150K USD in a BEC (Business email compromise) attack. Unidentified cyber assailant. Web/email cPanel:GODADDY. In-built 'security' allowed open web sessions. Hacker added himself to Domain forwarder list and listened to "Approve payment". I added the "Payment approvals", got breach timeline using Logs, (Linux, Regex, Grep, iftop), proposed Email migration, Disabled firewall, Activated SSL, Secured desktops to avoid more breach.

Regional Manager for IT

British Council MENA
jouluk. 2002 - marrask. 2011 (8 vuotta, 11 kuukautta)
1st and 2nd level support for 9000 MS Win/Exchange users. Virtualized half the continent, traveled 2 continents. Optimized backup jobs, service contracts, system parameters. You name it. Since 2014, I've developed an affection and a flare for Linux. So I switched. Now I only use Linux, both for fun and business. That's what i'll tell you to do too. Facing any problems with your Linux distro? We can work together to a solution.

Koulutus

Masters in CS

Foundation University, Pakistan 1998 - 1999
(1 )

Bachelors in CS

Foundation University, Pakistan 1993 - 1995
(2 vuotta)

Pätevyydet

CDPSE - Exam

ISACA Global
2021
Cleared the Certified Data Privacy Solutions Engineer by ISACA, a certification focusing on engineering Privacy oriented solutions.

ITIL

AXELOS
2008
ITIL V3 Foundation

Prince II Practitioner

AXELOS
2011
Projects in Controlled Environments Certified Fouindation

Ota yhteyttä käyttäjään Umer S. työhösi liittyen

Kirjaudu sisään keskustellaksesi yksityiskohdista chatin välityksellä.

Varmennukset

Suositeltu freelanceri
Henkilöllisyys varmennettu
Maksutapa varmennettu
Puhelinnumero varmennettu
Sähköpostiosoite varmennettu
Facebook yhdistetty

Parhaat taidot

Network Administration 14 System Admin 13 Linux 13 Web Security 13 Computer Security 12

Selaa vastaavia freelancereita

Network Administrators in Pakistan
Network Administrators
System Administrators
Linux Developers

Selaa vastaavia näyteikkunoita

Network Administration
System Admin
Linux
Web Security
Edellinen käyttäjä
Seuraava käyttäjä
Kutsu lähetetty onnistuneesti!
Rekisteröitynyttä käyttäjää Ilmoitettua työtä yhteensä
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)
Copyright © 2023 Freelancer Technology Pty Limited (ACN 142 189 759)
Ladataan esikatselua
Lupa myönnetty Geolocation.
Kirjautumisistuntosi on vanhentunut ja sinut on kirjattu ulos. Kirjaudu uudelleen sisään.