Syed Muhammad Ahmad Ali Gilani, Developer in Berlin, Germany
Syed is available for hire
Hire Syed

Syed Muhammad Ahmad Ali Gilani

Verified Expert  in Engineering

Security Engineer and Developer

Berlin, Germany
Toptal Member Since
November 17, 2022

Syed is a cyber-security professional with extensive experience in the field. He has specialized in various domains, including IT security, security operations and monitoring, cloud security, secure architecture design in AWS and Google Cloud Platform (GCP), and information security governance. He holds several certifications like the AWS Certified Security – Specialty and the AWS Certified Solutions Architect – Associate. Syed is also a Certified Information Systems Security Professional.



Preferred Environment

Python, Splunk, Amazon Web Services (AWS), Google Cloud Platform (GCP), ELK (Elastic Stack)

The most amazing...

...projects I've been involved in are MSSP tasks, including security operations, incident response, threat hunting, cloud security, and cloud threat research.

Work Experience

Cloud Threat Researcher

2021 - PRESENT
  • Researched and discovered various threats on AWS and GCP services for the company's customers daily.
  • Designed controls for each threat, focusing on both mitigation and prevention.
  • Stayed updated with the most recent cloud security news.
Technologies: Python, Amazon Web Services (AWS), Google Cloud Platform (GCP), Information Security

Senior Security Engineer

2018 - 2021
  • Developed multiple detection tools and automated response rulesets and scripts for security alert mitigation.
  • Handled several security incidents and performed recovery for managed security service provider (MSSP) clients.
  • Led a team of security engineers and handled L1 and L2 security escalations.
Technologies: Python, Amazon Web Services (AWS), Google Cloud Platform (GCP), ELK (Elastic Stack)

Application Log Monitoring and Response

Most organizations use security tools or logs provided by the platform in which their application is deployed to implement detection and response processes. This approach is performed, for example, through automation, SIEM, EDR, or SOAR solutions.

This script or mechanism allows users to integrate with their current security implementation and resorts to their application logs to perform detection and subsequent response.
2014 - 2018

Bachelor's Degree in Electrical Engineering

National University of Sciences and Technology - Islamabad, Pakistan


Certified Information Systems Security Professional (CISSP)


JUNE 2021 - JUNE 2024

AWS Certified Security – Specialty

Amazon Web Services


AWS Certified Solutions Architect – Associate

Amazon Web Services


Splunk, ELK (Elastic Stack), AlienVault




Amazon Web Services (AWS), Google Cloud Platform (GCP)


Windows PowerShell




Information Security, Cloud Security, Networking

Collaboration That Works

How to Work with Toptal

Toptal matches you directly with global industry experts from our network in hours—not weeks or months.


Share your needs

Discuss your requirements and refine your scope in a call with a Toptal domain expert.

Choose your talent

Get a short list of expertly matched talent within 24 hours to review, interview, and choose from.

Start your risk-free talent trial

Work with your chosen talent on a trial basis for up to two weeks. Pay only if you decide to hire them.

Top talent is in high demand.

Start hiring