SA
Saima Ahmed
Learner
(1)
4
Location
Milton, Ontario, Canada
Bio

I am seeking a security analyst role in cyber threat detection to leverage machine learning expertise and contribute to the field of cybersecurity.

To build up my skills to analyze complex security issues and develop effective solutions and at the same time effectively communicate security recommendations to both technical and non-technical stakeholders.

I am results-oriented and adept at delivering output while meeting client expectations in collaborative team environments.

Algorithm Engineer | Signal Processing | Data Analysis | Machine Learning | Research | Analytics | Threat Detection | Cybersecurity | Threat Modeling | Threat Intelligence |

Portals
Categories
Data analysis Security (cybersecurity and IT security) Machine learning Artificial intelligence Data science

Skills

Automated cost estimating integrated tools 1 Communication 1 Cyber security 1 Digital data systems 1 Digital systems 1 Incident reporting 1 Incident response 1 Planning 1 Security software 1 Security systems 1

Socials

Recent projects

Aceit Digital Inc.
Aceit Digital Inc.
Calgary, Alberta, Canada

Aceit Digital - Cyber Security and web Project

The main goal of this project is to plan, implement, manage, monitor and upgrade security measures for the protection of Aceit Digital's projects data, systems and networks.This involves several key phases:Planning: Initially, the project will involve a thorough assessment and planning phase. This includes identifying critical assets, understanding the current security landscape, and pinpointing potential vulnerabilities within Aceit Digital's data, systems, and networks. The planning stage will also involve setting clear goals and objectives for the security measures to be implemented, ensuring they align with the company's overall business strategy and technology infrastructure.Implementation: Following the planning phase, the project will move into the implementation stage. This involves deploying security measures that have been identified as necessary during the planning phase. This could include installing new security software, configuring hardware and network components for enhanced security, and integrating advanced security protocols into existing systems and networks.Management: Managing the implemented security measures is crucial for their effectiveness. This includes overseeing the operation of security systems, ensuring they are functioning as intended, and making adjustments as necessary. Regularly updating security policies and procedures to adapt to new threats and changing business needs is also a part of this phase.Monitoring: Continuous monitoring of Aceit Digital's systems and networks is essential to detect and respond to threats in real-time. This will involve setting up and maintaining a robust monitoring system that can identify suspicious activities, potential breaches, and vulnerabilities. The monitoring phase will also include regular security audits and assessments to evaluate the effectiveness of the security measures in place.Upgrading: The final phase of the project involves the regular upgrading of security measures. As technology evolves and new threats emerge, it's vital to stay ahead of potential security risks. This means regularly reviewing and upgrading security tools, systems, and protocols to ensure the highest level of protection against evolving cyber threats.Throughout the project, it's essential to maintain clear communication with all stakeholders, ensuring that everyone is aware of their roles and responsibilities in maintaining security. The project will also involve training and awareness programs for staff to recognize and respond to security threats effectively.

Matches 1
Category Information technology + 1
Closed

Education

Diploma, Cybersecurity
McMaster University Continuing Education and Lighthouse Labs, Canada
May 1 - July 17
Masters, Electrical Engineering- Signal Processing and Communication Systems
National University of Sciences & Technology, Pakistan
December 22 - January 1