Zeeshan H.

Zeeshan H.

7 Years of Experience with IT , System Admin & Cyber Security Expert

Dubai , United Arab Emirates

Experience: 8 Years

Zeeshan

Dubai , United Arab Emirates

7 Years of Experience with IT , System Admin & Cyber Security Expert

8 Years

Now you can Instantly Chat with Zeeshan!

About Me

Master’s Degree in Cyber Security

BS in Networking & telecommunications

Various Certifications relating to Cyber Security, Networking, IT and Data Engineering including CEH, CHFI, CCA, MCSA etc.

 Proactive, Attention to ...

 Proactive, Attention to detail, and resilience are my personal traits

 7 Years of hands-on Experience in IT industry including:

Data Engineer: Big data, Hadoop; HDFS, Map Reduce, Hive, Sqoop, Impala etc

Cyber Security: Vulnerability and Pen testing Assessments

Networking: Perfect and secure network solution, Integration & Up-gradation of IT&OT

Information Technology: IT Infrastructure Design, Integration & Implementation along Applications, Networking & security practices

Show More

Portfolio Projects

Automatic Analysis of Malware using Machine Learning

Company

Automatic Analysis of Malware using Machine Learning

Role

Backend Developer

Description

Malicious software - so called malware - poses a major threat to the security of computer systems. The amount and diversity of its variants render classic security defenses ineffective, such that millions of hosts in the Internet are infected with malware in the form of computer viruses, Internet worms and Trojan horses. While obfuscation and polymorphism employed by malware largely impede detection at file level, the dynamic analysis of malware binaries during run-time provides an instrument for characterizing and defending against the threat of malicious software.iwe propose a framework for the automatic analysis of malware behavior using machine learning. The framework allows for automatically identifying novel classes of malware with similar behavior (clustering) and assigning unknown malware to these discovered classes (classification). Based on both, clustering and classification, we propose an incremental approach for behavior-based analysis, capable of processing the behavior of thousands of malware binaries on a daily basis. The incremental analysis significantly reduces the run-time overhead of current analysis methods, while providing accurate discovery and discrimination of novel malware variants.

Show More Show Less

Tools

spyder

Hospital Management System

Company

Hospital Management System

Role

Full-Stack Developer

Description

It was a web based system that facilitates managing the functioning of the hospital or any medical set up.

This system or software will help in making the whole functioning paperless. It integrates all the information regarding patients, doctors, staff, hospital administrative details etc. into one software. It has sections for various professionals that make up a hospital.

Show More Show Less

Extracting Twitter Data, Pre-Processing and Sentiment Analysis using Python 3.0

{{totalColleagues-3 > 0 ?'+':''}}{{totalColleagues-3 > 0 ?+ totalColleagues-3 :''}}

Naseem G

Company

Extracting Twitter Data, Pre-Processing and Sentiment Analysis using Python 3.0

Description

Twitter is a gold mine of data. Unlike other social platforms, almost every user’s tweets are completely public and pullable. This is a huge plus if you’re trying to get a large amount of data to run analytics on. Twitter data is also pretty specific. Twitter’s API allows you to do complex queries like pulling every tweet about a certain topic within the last twenty minutes or pull a certain user’s non-retweeted tweets.

Show More Show Less

Tools

Python

CEH LAB

Company

CEH LAB

Description

For web based practicals and cloud based practicals use XAMPP server.

For working with web based vulnerabilities use the web vulnerable OS.

Download the direct plug and play setup from offensive security instead of downloading and doing fresh installation for KALILINUX.

Show More Show Less

Skills

VMWare

Pentesting LAB

Company

Pentesting LAB

Description

The purpose of a pen test is to identify vulnerabilities in your application exploitable from an outside attacker. Penetration testing can be performed against the various types of code and systems used in your application, such as APIs and servers.

Tools I have used and configured is as Follows .

 

Show More Show Less