I am a seasoned Head of Cybersecurity, stationed on the cybersecurity team at a group of companies, including Finance and Software development, and currently ensuring the security of 25+ software applications, Mobile apps, and IT, and network projects. Additionally, I am a member of the ISACA Dhaka Chapter, the EC-Council, the Bangladesh Computer Society, and many other international organizations. I have a robust fifteen-year career in cybersecurity, software development, database, networking, infrastructure, IoT, IT audit, cybersecurity consulting, and project management. I have technical, strategic, and leadership roles in different countries. I specialize in IT policy development, system administration, information security, data security, and IT audits. My expertise encompasses IT strategy, vendor management, partner management for OEMs, business continuity planning (BCP), disaster recovery planning (DRP), IT audits, digital forensics, incident response, and security operations centers. I am a certified professional in CISA, CEH, CHFI, CSA, PRINCE2, CMMI, ISMS, Deep Security, Risk Management, PCI DSS, PA DSS, Six Sigma, ITIL, COBIT5, Web Application Security, Mobile Apps Security, Database Administrator (DBA), Networking, and Governance Risk and Compliance (GRC). Adept in various programming languages, database administration, and operating systems, I have successfully contributed to multiple software migration and development projects. I am also an accomplished researcher, having published articles in reputable journals. My educational background includes an MSc in Information Systems Security, a BSc in Computer Science & Engineering, and a 4-year Diploma in Computer Engineering with outstanding results. I am also a candidate for a PhD. I am committed to excellence, reflected in my certifications, achievements, and active participation in professional societies, making me a valuable asset in global technology and cybersecurity.

About Me!

Hey, I am
MD SHAHIDULLAH

An ex-employee of 2 of the top 10 IT service provider companies in the world

15+ years
of dynamic careers in different sectors globally

70+ Cybersecurity Projects Successfully Done

Adjunct Faculty (for MSc in Cybersecurity) of Daffodil International University.
A. Professor

RESEARCH EXPERIENCE & PUBLICATION

1 Certified Information Systems Auditor-(CISA)
2. Certified Ethical Hacker (CEH)
3. Computer Hacking Forensic Investigator-(CHFI)
4. Certified SOC Analyst (CSA)
5. ISO/IEC 27001
6. PCI DSS
7. Splunk 7.x (SOC, SIEM)
8. Certified Information Systems Security Professional (CISSP)
9. Certified Information Security Manager-(CISM)
10. CMMI
11. Application Delivery Controllers
12. Database Management and Administration
13. Responsive Web Design & Development
14. THE 7 HABITS OF HIGHLY EFFECTIVE PEOPLE
15. ITIL (Information Technology Infrastructure Library) Foundation
16. Basic to Advanced Training on SharePoint Server
17. ISO-20000
18. Six Sigma Yellow Belt
19. SITUATIONAL LEADERSHIP II
20. PRINCE 2 Foundation
21. RINCE2 Practitioner
22. MistNet NDR
23. Penetration Testing
24. AI-Enabled Programming, Networking, and Cybersecurity: Practical Uses of AI Models, Tools, and Frameworks
25. DORA Requirements and AI Security: From Compliance to Threat Intelligence
26. ISO/IEC 42001:2023: Understanding and Implementing the Artificial Intelligence Management System (AIMS) Standard
27. Getting Started with AI and Machine Learning
28. Artificial Intelligence Foundations: Neural Networks
29. Hands-On PyTorch Machine Learning
30. Reinforcement Learning Foundations
31. Building Computer Vision Applications with Python
32. Deep Learning: Getting Started
33. Machine Learning Foundations: Linear Algebra
34. Artificial Intelligence Foundations: Thinking Machines
35. Cybersecurity Foundations: Governance, Risk, and Compliance (GRC) (2023)
36. Evaluating and Selecting the Best Cybersecurity Tool for Your Organization
37. Mastering Communications as a Leader
38. Implementing the NIST Risk Management Framework
39. AWS Certified DevOps Engineer - Professional (DOP-C02) Exam Tips
40. Artificial Intelligence for Cybersecurity
41. Business continuity planning-BCP
42. Incident Response-IR
43. Application security
44. Patch management
45. Security Assessment
46. Critical Thinking
47. Decision-Making
48. Data Encryption
49. Network Security
50. Team building
51. Security issues troubleshooting
52. Teamwork and Collaboration
53. Analytical Thinking
54. Self-Motivation
55. Excellent Communication
56. Analytical Skills
57. Professionalism
58. Risk Assessment
59. Time Management
60. LogRhythm Admin
61. LogRhythm Network Monitor for Analysts
62. Certified Network Security Specialist
63. MCSA Windows Server 2016
64. Certified Business Analysis Professional Certification
65. COBIT 5
66. C#, ASP.net
67. Stellar Cyber Analyst
68. Trend Micro Certified Professional
69. Certified Secure Software Lifecycle Professional (CSSP)
70. The Banking and Insurance Business: AML, KYC, the NAIC, IFRS, and More

Biography

  1. A Study of the Challenges of Implementing Cyber Security Services and Solutions in the Bangladeshi Financial Sector

  2. Vulnerability Assessment Penetration Testing (VAPT) for Web Applications

  • Reviewer of SEIP’s Cybersecurity Syllabus

  • Best Scout Leader Captain

  • Class Representative of MSc (BUP)

  • Multiple-time divisional athlete Champion

  • Multiple-time divisional swimming champion

  • 6th Bangladesh National Scout Jamboree, 1999

  • Cricket school captain

  • Cricket-Club Captain

  • Debate Champion

  • District Scholarship

CERTIFICATIONS & TRAININGS

SKILLS & QUALIFICATIONS

  1. Design, implementation and maintenance of Database

  2. Developer, Patch Deployment

  3. Design & Development of SQL Server

  4. Windows Server & RedHat Linux Platform.

  5. Experience in Wordpress, Dreamweaver, Photoshop and Illustrator

  6. MS Project, MS Visual Studio

  7. C/C++, C#.Net, ASP.Net, HTML, CSS, Java Script, PHP

  8. Kali Linux, Nessus, Metasploit

  9. Sqlmap, Burp Suite, Wireshark,

  10. Nmap, Splunk, Alien Vault,

  11. IBM QRadar, Acunetix, Netsparker,

  12. Intruder, John the Ripper,

  13. Aircrack-ng, W3af, Autopsy

  14. Trend Micro, AWS Prisma

  15. MITRE ATTACK, Symantec,

  16. Threat Intel, A-APT

ACHIEVEMENT

INFORMATION SYSTEMS AUDIT AND SECURITY COMPLETED

  • Multiple Banks

  • Multiple NBFIs

  • Telecoms

  • Groups of Companies and Conglomerates

  • International NGO

  • Government financial projects

Contact Me