Syed Atif Shamim


Location

Houston, TX
Education
    University of the Cumberlands
    August 2016 - May 2018
    degree
    Master's
    major
    Computer and Information Systems Security
    Sir Syed University of Engineering AND Technology
Work Experience
    TPC Group
    Cyber Security Expert
    January 2024 - present
    company
    TPC Group
    title
    Cyber Security Expert
    overview
    - Working on his Subject Matter expert for all Cyber /Network Security related projects in IT/OT Environments - Perdue Model design and implementation - Design and implement security measures to safeguard industrial control systems (ICS) and OT networks from cyber threats - Conduct risk assessments and vulnerability assessments to identify weaknesses and recommend remediation strategies - Develop and maintain security policies, procedures, and standards tailored to OT environments - Monitor OT networks for suspicious activities and respond to security incidents in a timely manner - Collaborate with cross-functional teams to integrate security controls into OT systems without disrupting operations - Stay abreast of emerging cyber threats and industry best practices to continuously improve cybersecurity posture - Proficient in industrial control systems (ICS) security principles and protocols (e.g., Modbus, DNP3 - Strong understanding of network security concepts (firewalls, IDS/IPS, VPNs), TxOne and protocols (TCP/IP, Ethernet - Experience with security tools such as Wireshark, Nessus, Snort, and Nazomi Network - Familiarity with regulatory requirements and standards relevant to OT cybersecurity (e.g., NIST SP 800-82, IEC 62443 - Excellent communication and teamwork skills, with the ability to effectively collaborate with stakeholders at all levels
    Jera Americas
    Senior Engineer Network AND Security
    June 2022 - January 2024
    DISH TV
    Senior Security Engineer
    Denver, CO, US
    September 2021 - June 2022
    Cyber Security Division
    Senior Network Security Architect
    Washington, DC, US
    June 2020 - August 2021
    BHP Billiton
    Lead Network Cyber Security Architect
    Houston, TX, US
    August 2018 - May 2020
Skills
24/7 ServicesAccess ControlsAdvanced Cardiovascular Life Support (ACLS)Agile MethodologyAmazon Web ServicesAnomaly DetectionAntivirus SoftwaresApple IOSApplication LayersArchitectureAsymmetric Digital Subscriber LineAuditing SkillsAudit TrailBackup and RestoreBackup DevicesBorder Gateway ProtocolBusiness Continuity PlanningCable ModemCactiCatalyst (Software)Certified Ethical HackerCiscoCisco CertificationCisco Certified Internetwork ExpertCisco Certified Network AssociateCisco Nexus SwitchesCisco PIXCisco SwitchesCisco Unified Communications ManagerClosed-circuit TelevisionCloud ComputingCloud ServicesCommunication SkillsComputer ForensicsComputer NetworksComputer SecurityConfiguration ManagementConstructionContinuous MonitoringControl Objectives for Information and Related Technology (COBIT)CryptographyCyberarkCybercrimeDashboardsData CentersData ClassificationData LossData ProtectionDigital Subscriber Line Access MultiplexerDisaster Recovery PlanDocsisDocumentumDomain ControllersDynamic Host Configuration ProtocolDynamic Multipoint Virtual Private NetworksElasticsearchElectrical SwitchesElectronicsEmployee OnboardingEncapsulation (Networking)Enhanced Interior Gateway Routing ProtocolEthernetFamily Educational Rights and Privacy ActFederal Information Processing Standards (FIPS)Federal Information Security Management ActFile TransferFirepowerFirewalls (Computer Science)Forensic SciencesFortinetFrame RelayHealth Insurance Portability and Accountability Act ComplianceHelp DeskHot Standby Router ProtocolIdentity and Access ManagementIEC 62443Impact AnalysisIncident ManagementIncident ReportIncident ResponseInformation TechnologyInformation Technology Infrastructure Libraries (ITIL)Information Technology Security AuditingInfrastructure as a Service (IaaS)Infrastructure ManagementInstallation TestingInternal Accounting ControlsInternet Protocol Security (IP SEC)InternetworkingIntrusion Detection and PreventionIntrusion Detection SystemsIP CamerasIS-ISISO/IEC 27002IT Security StandardsIT Service ManagementJuniperJuniper Networks Certified Internet AssociateJunosKnowledge of Electrical EngineeringKnowledge of EngineeringKnowledge of FinanceKnowledge of Standards ComplianceKnowledge of StatisticsLeased LinesLightweight Directory Access Protocols (LDAP)LinuxLoad BalancingLocal Area NetworksLogistics OperationsLTE (Telecommunication)MaintenanceMalwareManagement of ChangesMedia Gateway Control Protocol (MGCP)Mesh NetworkingMetro EthernetMicrosoft AccessMicrosoft AzureMicrosoft VisioMicrosoft WindowsModbusModelling SkillsModemsMulti-Factor AuthenticationMultiplexersMultiplexingMulti-protocol SystemsMulti Router Traffic GrapherNational Institute of Standards and TechnologyNessusNetwork AddressNetwork AdministrationNetwork ArchitectureNetworking SkillsNetwork Management SystemNetwork ProtocolsNetwork RoutersNetwork SecurityNetwork TestingNmapOAuthOktaOpenid ConnectOpen Shortest Path FirstOperation CentersOptical Fiber CablingOptical Time-Domain ReflectometerOptics and EyewearOutsourcingPCI Data Security StandardsPhysical SecurityPRINCE2Prioritization of RequirementsPrivate Automatic Branch ExchangeProblem SolvingProcess Control SystemsProfessional ResponsibilityProject ManagementProof of ConceptProxy ServersPython (Programming Language)RedlineRegulatory RequirementsRemote Access TechnologyRemote Authentication Dial in User Service (RADIUS)Remote MonitoringReverse EngineeringRisk AnalysisRoutingRTSPRubySafety PrinciplesSales ManagementSarbanes-Oxley Act (SOX) ComplianceSecure Hash AlgorithmSecurities MarketSecurity Assertion Markup Language (SAML)Security AwarenessSecurity ControlsSecurity DevicesSecurity Information and Event ManagementSecurity ManagingSecurity PoliciesSecurity SystemsSecurity TestingService DeliveryService QualitySignalling Connection Control Part (SCCP)Snort (Software)Social EngineeringSoftware ApplicationsSoftware Design DocumentsSoftware EngineeringSolarWinds (Software)SplunkSpywareSQL AzureStakeholder ManagementStrategic ThinkingSupervisory Control and Data Acquisition (SCADA)Synchronous Optical NetworkingSystem AvailabilitySystem SafetyTCP/IPTeam WorkingTelecommunicationsTelephone SkillsTerminal Access Controller Access-Control System (TACACS)Testing SkillsThreat ModelingTransport Layer SecurityTrend MicroTunnelsUser AuthenticationVirtual Local Area NetworksVirtual Private Networks (VPN)Virtual Router Redundancy ProtocolsVLAN Trunking Protocol (VTP)VmwareVoIPVulnerabilityVulnerability AnalysisWavelength-Division MultiplexingWeb Application SecurityWeb ServicesWide Area NetworksWi-Fi TechnologyWindows PowerShellWireless Access PointWireless CommunicationsWireless NetworksWireshark