Logo Freelancer Bagaimana Ia BerfungsiLayari Pekerjaan Log Masuk Daftar Siarkan Projek
MENJELAJAH
Computer Security Linux Network Administration System Admin Web Security
Profile cover photo
Anda sekarang mengikuti .
Ralat mengikuti pengguna.
Pengguna ini tidak membenarkan pengguna untuk mengikuti mereka.
Anda telah mengikuti pengguna ini.
Pelan keahlian anda hanya membenarkan 0 mengikuti. Naik taraf di sini.
Berjaya tidak mengikuti pengguna.
Ralat tidak mengikuti pengguna.
Anda berjaya mengesyorkan
Ralat mengesyorkan pengguna.
Sesuatu telah berlaku. Sila segar semula halaman dan cuba lagi.
E-mel berjaya disahkan.
Avatar Pengguna
$25 USD / jam
Bendera PAKISTAN
gujrat, pakistan
$25 USD / jam
Sekarang ini 2:19 PG di sini
Menyertai pada September 21, 2020
2 Syor

Umer S.

@FutureNOWPK

monthly-level-three.svg
4.9 (30 ulasan)
5.3
5.3
$25 USD / jam
Bendera PAKISTAN
gujrat, pakistan
$25 USD / jam
92%
Pekerjaan Disiapkan
91%
Mengikut Bajet
70%
Tepat Pada Masa
23%
Kadar Upah Semula

Linux | Reverse Engineering | Data Forensics

Trust | Reliability | Fair Value The values I live by. I am a Linux and Windows support professional. I like to work Security challenges and forensic assignments. I am very likely to pick up interesting projects on Linux that involve research around OpenNDS, OpenWRT, RaspberryPi, Data Extraction/Exfil. I am a supporter and promoter of Linux for security and desktop OS adoption. I do provide security enumeration, penetration testing and hardening and currently I focus on Reverse Engineering as core area of my work. Interestingly, I also have CISA, CISM and CDPSE (exams) certification and based on that, I help people with audit reports and presentations. For windows users, I can strengthen your system against malware and Ransomware. When I am not having any fun, I use my IELTS band 8 to produce great articles, procedure documents, policies and blogs. Get in touch and we will mutually explore the possibilities of what we can achieve. I have had opportunity to work with great employers like British Council, Arabian Group and now ISACA. Here's what you will find here Professional standards, confidentiality and ethics Linux and Windows expertise Penetration testing assignments Digital forensic assignments IS Audits/ Reports Policy and Procedure documentation Rapid prototypes of Web sites Thank you for visiting my profile. Also Watch an Explainer video [login to view URL] #Explainer #Video [login to view URL] - Great Concept #Website design for #Clothing and #Apparel Outfit #Website Concept [login to view URL] - Awesome Concept #Website design for #CarRental and #Tourism Operators Website [login to view URL] - Flexible concept #Website design for #Clothing and #Apparel #Outfit Website Concept [login to view URL] - A detailed concept #Website design for #NGO, #Healthcare organizations, #hospitals, #Clinics. [login to view URL] - Massive concept #Website design for #Architects, #Home #builders, #Property and #RealEstate Agents
Freelancer Network Administrators Pakistan

Hubungi Umer S. mengenai pekerjaan anda

Log masuk untuk membincangkan sebarang butiran melalui sembang.

Item Portfolio

Ransomware is one of the rising threats, alongside Business Email Compromise or BEC. They make up a large portion of cyber attacks on home, business and industries. I have a carefully selected set of techniques and tools that put many layers of defense around data that any one, everyone of us needs for their life, progress, integrity and even accountability.

Join the fight with me

FutureNOW
Ransomware Defense Techniques
Ransomware is one of the rising threats, alongside Business Email Compromise or BEC. They make up a large portion of cyber attacks on home, business and industries. I have a carefully selected set of techniques and tools that put many layers of defense around data that any one, everyone of us needs for their life, progress, integrity and even accountability.

Join the fight with me

FutureNOW
Ransomware Defense Techniques
Ransomware is one of the rising threats, alongside Business Email Compromise or BEC. They make up a large portion of cyber attacks on home, business and industries. I have a carefully selected set of techniques and tools that put many layers of defense around data that any one, everyone of us needs for their life, progress, integrity and even accountability.

Join the fight with me

FutureNOW
Ransomware Defense Techniques
Post COVID-19 worklife allowed office workers to use home devices which gave cyber criminals great opportunities to exploit worker's comfort. With unprecedented sensitive work, financial transaction, online ordering made using devices with legacy protection, an exploitation was inevitable. We offer following protection through this Freelancer.com in these use cases:

Home Device Users
 - Devices used for processing media by students and teachers
 - Devices used by family members for browsing the internet before making online purchases
 - Devices used to collaborate via Emails, Social Media
(SOHO) and Mid to large Businesses with extensive IT including IoT Devices

Cyber criminals do not have a humane connection with victims and following is how they destroy lives of victim The chances of recovering stolen or encrypted data is very grim
Private data, pictures, sensitive confidential documents & information 
 - up for sale on dark web.
 - held for large ransom
 - Deletion of private
Protection for home or office devices from all type of malwa
Post COVID-19 worklife allowed office workers to use home devices which gave cyber criminals great opportunities to exploit worker's comfort. With unprecedented sensitive work, financial transaction, online ordering made using devices with legacy protection, an exploitation was inevitable. We offer following protection through this Freelancer.com in these use cases:

Home Device Users
 - Devices used for processing media by students and teachers
 - Devices used by family members for browsing the internet before making online purchases
 - Devices used to collaborate via Emails, Social Media
(SOHO) and Mid to large Businesses with extensive IT including IoT Devices

Cyber criminals do not have a humane connection with victims and following is how they destroy lives of victim The chances of recovering stolen or encrypted data is very grim
Private data, pictures, sensitive confidential documents & information 
 - up for sale on dark web.
 - held for large ransom
 - Deletion of private
Protection for home or office devices from all type of malwa
Protection for home or office devices from all type of malwa
Protection for home or office devices from all type of malwa
A great concept #Website design for #Architects, #Home #builders, #Property and #RealEstate Agents Introduce your homes, showcase the features, introduce your able craftsmen, sales team, marketing team and share the values you live by. Great tool to stay on top this wedding season. Contact for details and customization.
https://www.youtube.com/watch?v=57_ZHVOwIBI
#Website design for #Architects, #Home #builders, #Property
A great concept #Website design for #Apparel and #Outfits & #Clothing shop. Whether you run your business from home, have a shop or run an e-commerce business, Introducing your #designs and your wardrobe to show the features, cloths, customer remarks and the values you live by, is a great tool to stay on top this wedding season. Contact for details and customization.
https://youtu.be/HQhLlMBLkJw
A great concept #Website design for #Apparel and #Outfit
The following website was created for an NGO, operating in Healthcare and Social Services, alongside branching out to provide IT education to underprivileged. This is the 3rd draft. Pure HTML CSS ideas from great fellow workers, and layering up with in the required order. 

https://www.youtube.com/watch?v=0AV3DUvOmoo
Web Design for a Healthcare/Social Care Organization
Summer vacations provide a challenge both for the child and the parents, as there are no set guidelines, no agreed outcomes, no performance levels regarded for these 90 days. As it has been for most of children, 90 days are spent, one day at a time with absolutely none or little contribution to his knowledge.

FutureSkillsPK believe these 90 days could be 700+ hours of pure career authoring that is no less fun than a good meet up, social hour or games as it will include all that.

Register your child for 700 hours of career authoring where he will have choices to make that will shape his future, before it is wasted. The activities include just enough study to keep them in touch with their school life, programming activities, game development, raspberryPi projects, linux, web development and more.

For a detailed chat about your child, contact us.

fb.me/futureNOW.PK
fb.me/futureskillspk
We all fear unknown, but are we afraid of the right thing?
Summer vacations provide a challenge both for the child and the parents, as there are no set guidelines, no agreed outcomes, no performance levels regarded for these 90 days. As it has been for most of children, 90 days are spent, one day at a time with absolutely none or little contribution to his knowledge.

FutureSkillsPK believe these 90 days could be 700+ hours of pure career authoring that is no less fun than a good meet up, social hour or games as it will include all that.

Register your child for 700 hours of career authoring where he will have choices to make that will shape his future, before it is wasted. The activities include just enough study to keep them in touch with their school life, programming activities, game development, raspberryPi projects, linux, web development and more.

For a detailed chat about your child, contact us.

fb.me/futureNOW.PK
fb.me/futureskillspk
We all fear unknown, but are we afraid of the right thing?
We all fear unknown, but are we afraid of the right thing?

Ulasan

Perubahan disimpan
Menunjukkan 1 - 5 daripada 30 ulasan
Tapis ulasan mengikut: 5.0
$10.00 USD
True professional, can handle every task , I work with him for the second time and there is no dought
Linux Debian Raspberry Pi
Avatar Pengguna
Bendera Amit W. @weissamit
•
2 bulan yang lalu
5.0
$50.00 USD
very good experience and understanding c/c++ and assembly, he was focused and determined more then i expected to get the job done. great understanding complexities of a complicated system.
C Programming Linux Software Architecture C++ Programming Debugging
M
Bendera Moshe Z. @moshezaga9
•
2 bulan yang lalu
5.0
₹1,400.00 INR
He is technically very sound and promising
Python Electronics Microcontroller Software Architecture Arduino
Avatar Pengguna
Bendera Manoj M. @manojindore
•
4 bulan yang lalu
5.0
$50.00 USD
Umer suggested his professional help in solving a driver issue for raspberry pie , he was professional fast and showed a lot of experience all the time , good price , good support , I will definitely work with him again
PHP Linux MySQL Web Hosting
+1 lagi
Avatar Pengguna
Bendera Amit W. @weissamit
•
5 bulan yang lalu
5.0
$65.00 USD
Umer is honest and straight forward person. Very helpful and comfortable to work with. The best person to get your job done on time.
Cisco Network Administration Network Engineering
C
Bendera Charles W. @charles932
•
5 bulan yang lalu

Pengalaman

Membership Affairs

ISACA - Lahore Chapter
Apr 2017 - Hari ini
I take care of the membership pool and help conduct seminars on various topics. Seminars Conducted on RANSOMWARE - 2019 ISACA Lahore - 2019

Consultant Cyber Security

(Confidnetial - Rubber Product Exporter)
Okt 2022 - Jan 2023 (3 bulan, 1 hari)
As a consultant analyzed a breach with potential to "reroute" 150K USD in a BEC (Business email compromise) attack. Unidentified cyber assailant. Web/email cPanel:GODADDY. In-built 'security' allowed open web sessions. Hacker added himself to Domain forwarder list and listened to "Approve payment". I added the "Payment approvals", got breach timeline using Logs, (Linux, Regex, Grep, iftop), proposed Email migration, Disabled firewall, Activated SSL, Secured desktops to avoid more breach.

Regional Manager for IT

British Council MENA
Dis 2002 - Nov 2011 (8 tahun, 11 bulan)
1st and 2nd level support for 9000 MS Win/Exchange users. Virtualized half the continent, traveled 2 continents. Optimized backup jobs, service contracts, system parameters. You name it. Since 2014, I've developed an affection and a flare for Linux. So I switched. Now I only use Linux, both for fun and business. That's what i'll tell you to do too. Facing any problems with your Linux distro? We can work together to a solution.

Pendidikan

Masters in CS

Foundation University, Pakistan 1998 - 1999
(1 tahun)

Bachelors in CS

Foundation University, Pakistan 1993 - 1995
(2 tahun)

Kelayakan

CDPSE - Exam

ISACA Global
2021
Cleared the Certified Data Privacy Solutions Engineer by ISACA, a certification focusing on engineering Privacy oriented solutions.

ITIL

AXELOS
2008
ITIL V3 Foundation

Prince II Practitioner

AXELOS
2011
Projects in Controlled Environments Certified Fouindation

Hubungi Umer S. mengenai pekerjaan anda

Log masuk untuk membincangkan sebarang butiran melalui sembang.

Pengesahan

Pekerja Bebas Pilihan
Identiti Disahkan
Pembayaran Disahkan
Telefon Disahkan
E-mel Disahkan
Facebook Dihubungkan

Kemahiran Teratas

Network Administration 14 System Admin 13 Linux 13 Web Security 13 Computer Security 12

Layari Pekerja Bebas Serupa

Network Administrators in Pakistan
Network Administrators
System Administrators
Linux Developers

Layari Pameran Serupa

Network Administration
System Admin
Linux
Web Security
Pengguna Sebelumnya
Pengguna Seterusnya
Jemputan berjaya dihantar!
Pengguna Berdaftar Jumlah Pekerjaan Disiarkan
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)
Copyright © 2023 Freelancer Technology Pty Limited (ACN 142 189 759)
Memuatkan pratonton
Kebenaran diberikan untuk Geolocation.
Sesi log masuk anda telah luput dan telah dilog keluar. Sila log masuk sekali lagi.