Syed Muhammad Ahmad Ali Gilani, Developer in Berlin, Germany
Syed is available for hire
Hire Syed

Syed Muhammad Ahmad Ali Gilani

Verified Expert  in Engineering

Security Engineer and Developer

Location
Berlin, Germany
Toptal Member Since
November 17, 2022

Syed is a cyber-security professional with extensive experience in the field. He has specialized in various domains, including IT security, security operations and monitoring, cloud security, secure architecture design in AWS and Google Cloud Platform (GCP), and information security governance. He holds several certifications like the AWS Certified Security – Specialty and the AWS Certified Solutions Architect – Associate. Syed is also a Certified Information Systems Security Professional.

Availability

Part-time

Preferred Environment

Python, Splunk, Amazon Web Services (AWS), Google Cloud Platform (GCP), ELK (Elastic Stack)

The most amazing...

...projects I've been involved in are MSSP tasks, including security operations, incident response, threat hunting, cloud security, and cloud threat research.

Work Experience

Cloud Threat Researcher

2021 - PRESENT
TrustOnCloud
  • Researched and discovered various threats on AWS and GCP services for the company's customers daily.
  • Designed controls for each threat, focusing on both mitigation and prevention.
  • Stayed updated with the most recent cloud security news.
Technologies: Python, Amazon Web Services (AWS), Google Cloud Platform (GCP), Information Security

Senior Security Engineer

2018 - 2021
Ebryx
  • Developed multiple detection tools and automated response rulesets and scripts for security alert mitigation.
  • Handled several security incidents and performed recovery for managed security service provider (MSSP) clients.
  • Led a team of security engineers and handled L1 and L2 security escalations.
Technologies: Python, Amazon Web Services (AWS), Google Cloud Platform (GCP), ELK (Elastic Stack)

Application Log Monitoring and Response

Most organizations use security tools or logs provided by the platform in which their application is deployed to implement detection and response processes. This approach is performed, for example, through automation, SIEM, EDR, or SOAR solutions.

This script or mechanism allows users to integrate with their current security implementation and resorts to their application logs to perform detection and subsequent response.

Platforms

Amazon Web Services (AWS), Google Cloud Platform (GCP)

Other

Information Security, Cloud Security, Networking

Languages

Python

Frameworks

Windows PowerShell

Tools

Splunk, ELK (Elastic Stack), AlienVault

Paradigms

DevSecOps

2014 - 2018

Bachelor's Degree in Electrical Engineering

National University of Sciences and Technology - Islamabad, Pakistan

OCTOBER 2022 - PRESENT

Certified Information Systems Security Professional (CISSP)

(ISC)²

JUNE 2021 - JUNE 2024

AWS Certified Security – Specialty

Amazon Web Services

JANUARY 2020 - JANUARY 2023

AWS Certified Solutions Architect – Associate

Amazon Web Services

Collaboration That Works

How to Work with Toptal

Toptal matches you directly with global industry experts from our network in hours—not weeks or months.

1

Share your needs

Discuss your requirements and refine your scope in a call with a Toptal domain expert.
2

Choose your talent

Get a short list of expertly matched talent within 24 hours to review, interview, and choose from.
3

Start your risk-free talent trial

Work with your chosen talent on a trial basis for up to two weeks. Pay only if you decide to hire them.

Top talent is in high demand.

Start hiring