Esrat Zaman

Cyber Security Architect at Ciptor Authentication Experts
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
Bangkok City, Thailand, TH

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

You need to have a working account to view this content.
You need to have a working account to view this content.

Experience

    • Sweden
    • IT Services and IT Consulting
    • 1 - 100 Employee
    • Cyber Security Architect
      • Dec 2022 - Present

      As a Cybersecurity Architect, my primary goal is to create a secure and resilient environment that protects the organization's critical assets and ensures the confidentiality, integrity, and availability of data. I’m responsible for designing and implementing comprehensive security solutions to protect an organization's digital infrastructure, systems, and data from potential threats and vulnerabilities. My role involves analyzing existing security measures, identifying weaknesses, and developing strategies to address them effectively.Major Key Responsibilities:• Security Architecture Design• Threat Assessment and Risk Analysis• Security Solutions Implementation• Security Policy Development• Security Audits and Testing• Incident Response and Recovery• Security Awareness and TrainingSkills and Qualifications:• In-depth knowledge of cybersecurity principles, best practices, and technologies• Proficiency in security architecture design and implementation• Strong understanding of network security, encryption, and authentication protocols• Experience with security frameworks such as NIST, ISO 27001, NIS2• Familiarity with regulatory compliance requirements (e.g., GDPR, HIPAA, PCI DSS)• Knowledge of cloud security principles and experience with cloud platforms (e.g., AWS, Azure, Private)• Expertise in conducting security assessments, vulnerability testing, and penetration testing• Strong analytical and problem-solving skills• Excellent communication and interpersonal skills to collaborate with stakeholders Show less

    • Cybersecurity Architect
      • Dec 2019 - Dec 2022

      As a Cybersecurity Architect, my primary goal is to create a secure and resilient environment that protects the organization's critical assets and ensures the confidentiality, integrity, and availability of data. I’m responsible for designing and implementing comprehensive security solutions to protect an organization's digital infrastructure, systems, and data from potential threats and vulnerabilities. My role involves analyzing existing security measures, identifying weaknesses, and developing strategies to address them effectively.Major Key Responsibilities:• Security Architecture Design• Threat Assessment and Risk Analysis• Security Solutions Implementation• Security Policy Development• Security Audits and Testing• Incident Response and Recovery• Security Awareness and TrainingSkills and Qualifications:• In-depth knowledge of cybersecurity principles, best practices, and technologies• Proficiency in security architecture design and implementation• Strong understanding of network security, encryption, and authentication protocols• Experience with security frameworks such as NIST, ISO 27001, NIS2• Familiarity with regulatory compliance requirements (e.g., GDPR, HIPAA, PCI DSS)• Knowledge of cloud security principles and experience with cloud platforms (e.g., AWS, Azure, Private)• Expertise in conducting security assessments, vulnerability testing, and penetration testing• Strong analytical and problem-solving skills• Excellent communication and interpersonal skills to collaborate with stakeholders Show less

    • Cyber Security Risk Specialist
      • Nov 2017 - Dec 2019

      In my role as a Cybersecurity Risk Specialist, I have been responsible for assessing, analyzing, and mitigating potential risks to an organization's information systems and data. I supported our clients to develop and implement strategies to protect them from cyber threats and ensure the confidentiality, integrity, and availability of sensitive information. My strong understanding of information security principles, risk management methodologies, regulatory requirements, excellent communication, and leadership skills with stakeholders at all levels, have been the key success-factors in performing my job on a very high professional level.Additionally, staying updated with the latest cybersecurity trends and emerging threats has been crucial to proactively address potential risks and learn new things. Major responsibilities:• Risk Assessment • Risk Mitigation Strategy• Compliance and Standards• Incident Response Planning• Security Awareness and Training• Risk Monitoring and Reporting• Vendor and Third-Party Risk Management• Security Audits and Assessments• Incident Investigation Show less

    • Cyber Security Analyst
      • Sep 2015 - Nov 2017

      My job as a Cyber Security Analyst, I have been responsible for protecting computer systems, networks, and data from potential threats and breaches. I have played a crucial role in ensuring the confidentiality, integrity, and availability of information and technology assets for Ciptor’s clients. I have a strong knowledge of computer networks, operating systems, and security technologies. Familiarity with common security frameworks and standards. Proficiency in security tools and technologies, such as SIEM, IDS/IPS, vulnerability scanners, and antivirus systems. Understanding of encryption, authentication, and access control mechanisms. Knowledge of malware analysis and incident response techniques.I have strong knowledge of compliance with relevant laws, regulations, and industry standards e.g., NIST, NIS2, GDPR, PCI-DSS and ISO 27001.My analytical and problem-solving skills has been used to identify and resolve security issues. I have excellent communication skills to effectively collaborate with cross-functional teams and stakeholders. I continuous try to learn new things and to staying updated with the latest security trends, vulnerabilities, and attack techniques.Major activities:• Threat Monitoring and Incident Response• Vulnerability Assessment and Penetration Testing• Security Operations and Monitoring• Security Policy and Procedure Development• Security Incident Investigation and Forensics• Security Risk Assessment and Management• Security Auditing and Compliance Show less

    • Bangladesh
    • Telecommunications
    • 700 & Above Employee
    • Telecommunications Engineer
      • Jun 2014 - Aug 2015

      • Planning network installations by studying customer orders, plans, manuals, and technical specifications; ordering and gathering equipment, supplies, materials, and tools, assessing installation site; preparing an installation diagram. • Establishes voice and data networks by running, pulling, terminating, and splicing cables; installing telecommunications equipment, routers, switches, multiplexors, cable trays, and alarm and fire-suppression systems; Verifies service by testing circuits, equipment, and alarms; identifying, correcting, or escalating problems. • Working with Huawei and Ericsson MX and able to do optical connectivity trough mux & working with “Pathloss” to do microwave connectivity • Providing technical guidance to colleagues and other teams. Show less

Education

  • Ahsanullah University of Science and Technology
    BSC in Computer Science & Engineering, Computer Science
    2009 - 2013
  • Viqarunnisa Noon College
    HSC, Science
  • Viqarunnisa Noon School
    SSC, Science

Community

You need to have a working account to view this content. Click here to join now