
Contact Info
Md. Shahadat Hossain
Lead Trainer & Cyber Security Expert | Principal Security Architect at Grameenphone Limited
Educations
ATT&CK® Cyber Threat Intelligence from Narrative Reporting ATT&CK® Cyber Threat Intelligence from Narrative Reporting MITRE Engenuity
Offensive Security Certified Professional Offensive Security Certified Professional OffSec
Certified in Risk and Information Systems Control (CRISC) Certified in Risk and Information Systems Control (CRISC) ISACA
LPT (Licensed Penetration Tester) LPT (Licensed Penetration Tester) EC-Council
Certified Information Technology Manager (CITM) Certified Information Technology Manager (CITM) EPI, Singapore
Computer Hacking Forensic Investigator Computer Hacking Forensic Investigator EC-Council
Certified Information Systems Security Professional (CISSP) Certified Information Systems Security Professional (CISSP) (ISC)²
Certified Information Security Manager (CISM) Certified Information Security Manager (CISM) ISACA
Certified Information Systems Security Auditor (CISA) Certified Information Systems Security Auditor (CISA) ISACA
Certified Information Systems Security Professional (CISSP) Certified Information Systems Security Professional (CISSP) (ISC)2
ISMS Auditor (ISO27001) ISMS Auditor (ISO27001) IRCA
Certified Data Center Professional (CDCP) Certified Data Center Professional (CDCP) EPI
Certified Ethical Hacker (CEH) Certified Ethical Hacker (CEH) EC COUNCIL
Certified Payment Card Industry Standard Implementer (CPISI) Certified Payment Card Industry Standard Implementer (CPISI) SISA, India
Information Technology Infrastructure Library (ITIL) Information Technology Infrastructure Library (ITIL) OGC
SABSA Foundation SCF SABSA Foundation SCF The SABSA Institute
Skills
IT Operation
IT Security
IT Audit
Ethical Hacking
Penetration Testing
ISO27001 Implementation
ITIL
Vulnerability Assessment
PCI-DSS Implementation
Information Security
CEH
PCI DSS
CISA
ISO 27001
IPS
Network Security
OSPF
CCNA
Risk Management
Security
Computer Security
Cisco Technologies
Routing Protocols
Windows Server
Governance
EIGRP
Red Hat Linux
Information Security Management
Microsoft Certified Professional
Vulnerability Management
ASA
CISSP
Microsoft Exchange
CISM
SCCM
Disaster Recovery
Network Architecture
Firewalls
Network Administration
Networking
Network Design
COBIT
PIX
Has extensive knowledge and experience on following:-
- NIST Cyber Security Framework
- SANS Top 20 Security Control
- Network Connectivity Architecture
- System/Database/Network Device Hardening
- Vulnerability Assessment
- Penetration Testing
- Security Configuration Review
- PCI-DSS Compliance Implementation
- Security Policy Development
- IT Strategic Planning
- SIEM Implementation
- CEH, ECSA, CISSP, CISA Training
- Security Awareness Training
I made myself capable of doing some developments in a different platform. I think this offer can provide me at the same time a good opportunity to be involved with some real time works and enrich my own expertise and also get to know a lot of people which I consider very important.