
Razaq Azeez
Verified Expert in Engineering
IT Security Expert and Developer
Gothenburg, Sweden
Toptal member since May 1, 2024
Razaq has 16 years of information security experience across multiple sectors, including payment and financial services, technology and telecommunications, and audit and consulting. His in-depth professional training and certifications have given him an advanced understanding of essential security domains. Razaq is proficient in vulnerability assessment, cloud security (AWS, Azure, GCP), application security, DevSecOps, threat and risk management, and information security governance.
Portfolio
Experience
- VAPT - 10 years
- Static Application Security Testing (SAST) - 9 years
- Dynamic Application Security Testing (DAST) - 8 years
- IT Security - 8 years
- Information Security Management Systems (ISMS) - 8 years
- Application Security - 8 years
- GCP Security - 6 years
- AWS Cloud Security - 5 years
Availability
Preferred Environment
Linux, Windows, Incident Management, ISO 27001, End User Support, Blockchain, Crypto
The most amazing...
...thing I've done is uncover a security exploit in a banking app, leading to the detection of a $3 million fraud incident.
Work Experience
Application Security Developer
Yahoo! - Paranoids
- Reduced in-code vulnerability frequency by providing secure coding awareness to developers.
- Enhanced overall security of Yahoo products by identifying threats and recommending mitigations using STRIDE threat modelling approach.
- Contributed to reduction of false positive findings by performing exploits of vulnerabilities identified with scanning tools.
Lead Consultant of Application Security
Cyber Instincts AB
- Reviewed cloud software design in AWS and GCP environments to verify the fulfillment of security requirements, contributing to a 20% reduction in technical debt from vendors and 3rd-party security providers.
- Headed penetration testing for applications and their supporting technology stack, leading to the detection of approximately $3 million in internal fraud.
- Performed a source code review to identify security vulnerabilities, critical hotspots, and bugs and provided remediation strategies, saving 15% on the annual security budget.
IT Security Engineering and Architecture Consultant
Bitso
- Collaborated with engineering, SRE, and product teams to integrate cybersecurity requirements into the development lifecycle, cutting the company's attack surface by 10%.
- Developed and executed a robust application security strategy within AWS and GCP environment to protect applications and systems from security threats, improving the application security risk score by 25 units annually.
- Assisted in managing security incidents and events to safeguard application assets, such as intellectual property, regulated data, and the company's reputation, thereby saving 10% of the annual security budget dedicated to incident response.
IT Security and GRC Lead Consultant
Digital Jewels
- Headed the implementation of network, technology, and application vulnerability assessments and penetration testing across various sectors.
- Oversaw security assessments and audits for cloud technologies and migrations for clients in multiple sectors.
- Managed the audit process and the subsequent ISO 27001 and PCI DSS certification process across various industries.
- Maintained effective communication with internal and external stakeholders within the client portfolio, ensuring a clear understanding of information security capabilities in a technical support capacity.
Information Security and Risk Management Head | ISP Business
eStream Networks
- Ensured security of end-to-end network infrastructure.
- Provided level 3 support for ISP clients' network and security incidents.
- Implemented a secure, adaptive private network for banking and financial service institutions.
IT and Network Support Head
Communication Network Support Services
- Conducted technical risk assessments for various technologies, including networks, applications, wireless systems, social engineering, code reviews, and war dialing.
- Minimized network incidents by resolving issues, managed data center network setup and maintenance, and expedited problem resolutions through vendor escalation.
- Spearheaded developing and testing the corporate business continuity and disaster recovery plans.
Experience
Bitso Payment App Security Testing
https://bitso.comKlasha Mobile Penetration Testing
https://www.klasha.comPCI DSS Audit of Major Commercial Banks in Africa
Information Security Management System Implementation
Penetration Testing of Mouka's Technology Stack
https://mouka.com/Zeekr S-Left
I defined specific security requirements and worked with the Development and Technology Operations team to implement them throughout the banking software lifecycle.
This helped detect intentional fraud (by an internal developer) that could have resulted in a loss of at least $5 million.
Product Security Review of Yahoo DSP, AOL, and DNS Orchestration Tool
• Manual code review
• Penetration testing and dynamic security testing
• Threat modeling
• Collaborating with developers to identify and resolve security vulnerabilities.
Education
Master's Degree in IT Project Management
University West - Trollathan, Sweden
Master's Degree in Information Security and Digital Forensics
University of East London - London, UK
Bachelor's Degree in Communications Technology
National Open University of Nigeria - Lagos, Nigeria
Certifications
Certified Chief Information Security Officer
EC-Council
Microsoft Certified Azure Security Specialist (AZ-500)
Microsoft
Certified DevOps Information Security Engineer
DevOps Institute
Certified Incident Handler
EC-Council
Certified API Security Architect
API Academy
Certified Information Systems Security Professional
ISC2
Certified Network Security Specialist
International Cybersecurity Institute, UK
PCI DSS – Qualified Security Assessor (QSA)
PCI Council
Scrum Fundamentals Certified
Scrum.org
PECB Certified ISO/IEC 27001 Senior Lead Auditor
PECB
PECB Certified ISO/IEC 27001 Lead Implementer
PECB
Cisco Certified Network Associate (CyberOps)
Cisco
Information Technology Infrastructure Library (ITIL)
EXIN
Skills
Tools
Google Compute Engine (GCE), GCP Security, Google Kubernetes Engine (GKE), Logging, BitLocker, NMap, Snort, Metasploit, Nessus, SonarQube, VeraCrypt, Checkmarx, Splunk
Languages
Java, Python, SAML, Go, C#, C#.NET
Paradigms
DevSecOps, Penetration Testing, HIPAA Compliance, Security Software Development, Agile, Scrum, Fuzz Testing
Platforms
Azure, Amazon Web Services (AWS), Google Cloud Platform (GCP), Linux, Windows, Blockchain, Kubernetes, QualysGuard, Android, Java EE, Kali Linux, Burp Suite
Industry Expertise
Cybersecurity
Storage
Google Cloud Storage, On-premise, Database Security, Database Management Systems (DBMS)
Other
IT Security, Information Security Management Systems (ISMS), Application Security, Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), VAPT, GRC, Network Security, Incident Management, ISO 27001, PCI DSS, Risk Management, Security, Cloud Security, Security Architecture, Threat Modeling, Design Reviews, Source Code Review, OWASP, Vulnerability Management, NIST, Security Information and Event Management (SIEM), Identity & Access Management (IAM), SOC 2, Web Security, Crypto, Security Architecture Assessment, VPC, Monitoring, Digital Forensics, CISSP, Ethical Hacking, Architecture, PCI, Information Security, Security Audits, Risk Assessment, Vulnerability Assessment, CISM, Vulnerability Identification, Website Audits, ISO Compliance, Incident Response, Security Assessment, Open-source Intelligence (OSINT), Vulnerability Scanning, Web App Security, Audits, Security Compliance, Networks, Compliance, Scanning, Risk Analysis, Secure Software Development Lifecycle (SSDLC), Mobile App Security, Cybersecurity Maturity Model Certification (CMMC), End User Support, Security Engineering, Dynamic Analysis, AWS Cloud Security, SIEM, Single Sign-on (SSO), Cisco, Cryptocurrency, CI/CD Pipelines, Infrastructure as Code (IaC), Cybersecurity Operations, Virtual Cloud Network (VCN), Certified Information Systems Auditor (CISA), CISO, SecOps, SOC Compliance, Networking, IDS/IPS, Endpoint Protection, Encryption, Product Security, Firmware, Software Composition Analysis (SCA), Data Protection, Technical Documentation, Security Policy Analysis, Information Systems, Management Information Systems (MIS), IT Projects, IT Project Management, IT Audits, Network Configuration, IP Networks, Firewalls, APNs, M2M, SD-WAN, Cisco Networking, Active Directory (AD), Linux Servers, IT Governance, ISMS implementation, Security Operations Centers (SOC), Azure Cloud Security, Enterprise Cybersecurity, Cryptography, IT Service Management (ITSM), SAML-auth, Code Review, Snyk, Risk Modeling, Cybersecurity Automation, Fraud Detection
How to Work with Toptal
Toptal matches you directly with global industry experts from our network in hours—not weeks or months.
Share your needs
Choose your talent
Start your risk-free talent trial
Top talent is in high demand.
Start hiring