Summary
Overview
Work History
Education
Skills
Certification
Accomplishments
Work Availability
Affiliations
Work Preference
Quote
Software
Languages
Interests
Websites
Timeline
Generic
Muhammad Azeem Sarwar

Muhammad Azeem Sarwar

IT/OT/ICS Cybersecurity | DFIR | CTI | CTH | Purple Teamer | Defense, Cyber Defense & Cyber Security Expert
Riyadh

Summary

Seeking a full-time position that offers professional challenges and allows for the utilization of interpersonal skills, effective time management, and problem-solving expertise. Passionate about contributing to a dynamic team environment and making a positive impact on organizational goals. Dedicated to continuous learning and growth to excel in any role. Eager to apply a diverse skill set and drive for success to add value to a forward-thinking company.

Overview

17
17
years of professional experience
12
12
Certifications
5
5
Languages

Work History

Chief Technology Manager

SCOPA Defense (https://scopa.com.sa/)
08.2024 - Current
  • Ensured smooth integration of new acquisitions into existing technology infrastructure with minimal disruption to daily operations.
  • Recruited and trained IT team members.
  • Developed suggestions for technical process improvements to optimize resources.
  • Analyzed company processes to determine outsourcing feasibility.
  • I conduct digital investigations and bring technical expertise to improve intelligence analysis. I also prepare clients to identify and respond to a range of defense & security threats.
  • Conducted OSINT investigations for law enforcement, corporate clients, and cybersecurity teams, resulting in the identification of critical threats and the prevention of potential security breaches.


  • Analyzed data points from social media, dark web, and public databases to support intelligence operations, leading to the successful resolution of cases.
  • Budgeting and Resource Allocation: Plan, manage, ensuring cost-effective solutions that meet operational requirements.
  • Cybersecurity and Data Protection: - • Advanced Cybersecurity Measures • Threat Intelligence • Encryption and Secure Communication
    • Incident Response
  • Technology Integration and Innovation: - • Emerging Technologies • Surveillance and Monitoring Systems • Weapon Systems and Defense Technologies
  • Compliance and Legal Responsibilities: - • Regulatory Compliance • Ethical Standards • Audits and Reporting.
  • Operational Support: - • Real-Time Data Analysis • Communication Systems • Geospatial Intelligence
  • Team Leadership and Training: - • Team Management • Training Program • Incident Command
    Key Technologies Managed: - • Cybersecurity Tools • Surveillance Intelligence Systems (TECHINT, OSINT, ADINT, SIGINT, GEOINT & FININT) • Communication Systems• Data Analytics• Geospatial Technologies
  • Developed custom scripts in Python to streamline data collection and analysis, improving operational efficiency.

Principal DFIR Lead

Saudi Business Machine
04.2019 - 08.2024

• Assist as an expert in IR, Malware analysis and Digital Forensics artefacts.
• Perform complex incident response technical investigation and develop technical conclusions based on the
examination of the root cause of evidence; review analysis and conclusions of team member consultants.
• Document verdicts, and develop IR remediation recommendations by representing verbally and in written reports
to executives.
• Conduct intramural assessments of incidents, designing and delivering IR action to assist internal IR plans.
• Assessment of reverse-engineering methods.
• Digital forensic inspections, investigations and examinations on Windows, Linux, Cloud and macOS-based
systems.

Sr. Cyber Security Consultant

Wipro Arabia Ltd
10.2014 - 02.2019

• Malware Analysis dynamic as well as static.
• Threat hunting by performing deep-level analysis by correlating different feeds.
• Incidents Response investigations on day-to-day tasks.
• Team member of VAPT team to optimize infrastructure security vulnerability assessment.
• Infra Object Pen testing with Kali & Parrot Security’s tool.
• Mobile/Web app Penetration testing as per new modification.
• Network Vulnerability Assessment and generate reports with a resolution of the vulnerability as per the
environment.
• Risk Assessment on infrastructure and take steps to minimize the risk factor.
• Use cases development and fine-tune SIEM rules accordingly
• Investigate network & systems events on L2/L3 level on daily basis.
• Familiarity with forensic artifacts typically found on Windows and Linux operating
systems
• Threat hunting proactive /Post-Active by using Recorded future and Carbon black
threat feeds.
• Identify and manage information security risks to achieve business objectives.
 Perform information security risk assessments and serves as an internal auditor for
security issues.
 Develop, document, maintain and oversee compliance with IT Policies & Procedures to
improve Information Security Management System (ISMS).
 Work with key senior managers responsible for workflow.
• Develop SOPs after incident response handling and mitigating risk.
Accomplishment:
• Created threat advisories by reverse engineering malware samples and finding IOCs and kill switches.
• Performed IR activity and actively looked for the infected machines on the Shamoon, WannaCry Ransomware
outbreak.
• Root analysis has been performed and found kill switches and Created watch lists and rules for Shamoon,
WannaCry and Petya Ransomware for multiple clients. Contained and performed

Information Security Engineer

National Net Venture Groups
08.2011 - 08.2014

Deployed IT infrastructure (Domain & Network) as a technical specialist and set up for security.
• Manage/Implement Endpoint Detection and Response like (Cisco AMP-Firewalls, Carbon Black, Titanium)
• Monitoring Sniffer traces and Interpretation using Wireshark.
• Log analysis of OS, network, applications and security technologies.
• Perform basic malware analysis
• Develop monitoring and IR documentation
• Perform vulnerability assessment of servers and applications
• Security events monitoring using SIEM: Splunk, Dell SecureWorks and ArcSight.
• Performed Incident response activities.


NOC Security Engineer

Brain Telecommunication Ltd
02.2009 - 02.2011

 Uptime of running Network of more than 2500 ports of CISCO Switching (series 2900,2950 & 3550) for
Brain METRO Network.
 Configuration & maintenance of Cisco ASA 5500 series, Firepower & Routers 2800,3600 & 7600 series.
 Configuration of protocols IGP & EGP.
 The configuration of the site-to-site VPN, MPLS VPN, DM & easy VPN in multiple projects.
 Monitor NMS, Monitor Metro Switch & Router.
 Evaluate the current network topology and identify specific initiatives to pursue in support of the strategic
network architecture.
 Keep the servers & network devices in running position.
 Monitor Mail & other core servers, Monitor Logs of mail servers.

Network & System Administrator

Corvit Solution System
01.2008 - 07.2009

 To configure/manage/monitor all the network/System devices such as PCs/Laptops, routers and switches.
 Worked on Cisco 2960, 3550, 3560, series Switches and 2800, 2900, 3600, and 3800 series Routers.
 Perform a backup/restore of configurations of Systems, Switches and Routers.
 Cisco/Microsoft professional certifications complete training from CORVIT Systems, the job focused on
learning how databases and corporate IT flow affect the overall corporate environment and tasks.
 Responsible for IT network/infrastructure management including network/systems performance tuning
and security monitoring.
 Responsible for Network/System integration with the Web Server and Data Base Server.

Education

Master of Science - IT Network Security

Virtual University PK
Lahore, Pakistan
04.2001 -

Bachelor of Science - Computer Science

Punjab University, PK
Lahore, Pakistan
04.2001 -

Skills

Friendly, positive attitude

Certification

OSCP

Accomplishments

  • Supervised team of 25+ staff members.
  • Collaborated with team of 40+ in the development of OSINT

Work Availability

monday
tuesday
wednesday
thursday
friday
saturday
sunday
morning
afternoon
evening
swipe to browse

Affiliations

  • Offensive Security
  • GIAC
  • CISCO
  • MICROSOFT
  • REDHAT
  • ELearning Security
  • EC Council
  • Black Hat

Work Preference

Work Type

Full Time

Work Location

Hybrid

Important To Me

Career advancementCompany CulturePersonal development programs

Quote

Success is not final; failure is not fatal: It is the courage to continue that counts.
Winston S. Churchill

Software

SIEM

Incident Response

Digital Forensics

Reverse Engineering

Endpoint Detections

Compromise Assessment

Penetration Testing

OSINT

Languages

English
Advanced (C1)
Arabic
Upper intermediate (B2)
Urdu
Bilingual or Proficient (C2)
Hindi
Bilingual or Proficient (C2)
Punjabi
Bilingual or Proficient (C2)

Interests

Offensive & Defensive Teaming

New Technology Adaptive

Social Media Intelligence

Dark Web Investigations

Metadata Analysis

Geospatial Intelligence

OSINT Tools

Automation Scripting & Blockchain Analysis

Anti-Forensics Techniques & Malware Analysis

Memory, Mobile, Disk & Network Forensics

Timeline

Chief Technology Manager

SCOPA Defense (https://scopa.com.sa/)
08.2024 - Current

Malware Analysis & Memory Forensics

12-2023

OSCP

10-2023

GCFA

07-2023

OSINT

05-2023

CCISO

03-2023

ECDFP

06-2022

CHFI

04-2020

Principal DFIR Lead

Saudi Business Machine
04.2019 - 08.2024

PCNSE

04-2019

CEH

03-2019

CCIE SEC

12-2016

Sr. Cyber Security Consultant

Wipro Arabia Ltd
10.2014 - 02.2019

Information Security Engineer

National Net Venture Groups
08.2011 - 08.2014

RHCE

08-2011

MCSE

07-2011

NOC Security Engineer

Brain Telecommunication Ltd
02.2009 - 02.2011

Network & System Administrator

Corvit Solution System
01.2008 - 07.2009

Master of Science - IT Network Security

Virtual University PK
04.2001 -

Bachelor of Science - Computer Science

Punjab University, PK
04.2001 -
Muhammad Azeem SarwarIT/OT/ICS Cybersecurity | DFIR | CTI | CTH | Purple Teamer | Defense, Cyber Defense & Cyber Security Expert