POUYAN FARAHMAND
IT/Cyber Security Specialist
Pouyan Farahmand is a highly seasoned and reliable IT/Cyber Security Specialist with over 10 years of experience in the field. He has a proven track record of successfully implementing and managing IT security solutions for both small and large businesses.
Pouyan has a deep understanding of security risks and vulnerabilities and is able to identify and mitigate them effectively. He has a strong technical background and is well-versed in a variety of security tools and technologies.
Pouyan is a highly motivated individual who is always looking for new challenges. He is a team player and is always willing to lend a helping hand.
Pouyan is fluent in English and Persian.
Skills
- Able to identify and prevent common cyber security threats
- Strong understanding of cyber security principles and practices
- Familiarity with popular cyber security tools and technologies
- Ability to effectively communicate cyber security risks and mitigation strategies to non-technical staff and executives
- Experience managing and responding to cyber security incidents
- Ability to develop and implement cyber security policies and procedures
- Familiarity with cyber security regulations and compliance requirements
1. Experience with firewalls, intrusion detection/prevention systems, and security event management systems
2. In-depth knowledge of security protocols and industry-standard best practices
3. Strong analytical and problem-solving skills
4. Ability to conduct risk assessments and identify potential security threats
5. Experience developing and implementing security policies and procedures
6. Knowledge of cryptography and data encryption technologies
7. Familiarity with vulnerability assessment and penetration testing tools
8. Experience with log management and analysis tools
9. Ability to effectively manage and respond to security incidents
10. Strong communication and interpersonal skills
11. Ability to work independently and as part of a team
12. Flexibility and adaptability to rapidly changing conditions
13. Highly motivated and detail-oriented
14. Critical thinking and creative problem solving
15. Good organizational and time management skills
16. Strong research and writing skills
17. Basic knowledge of web development and programming
18. Familiarity with databases and database security
19. Familiarity with network security concepts and technologies
20. Understanding of social engineering and phishing attacks
21. Experience with security information and event management (SIEM) solutions
22. Understanding of malware analysis and reverse engineering
23. Familiarity with wireless security protocols and technologies
24. Understanding of cloud security issues and concerns
25. Experience with security auditing and compliance testing
26. Understanding of Industrial Control Systems (ICS) security
27. Familiarity with mobile device security issues and concerns
28. Understanding of Internet of Things (IoT) security risks and vulnerabilities
29. Experience with incident response and crisis management
30. Cyber security certifications (Cisco, CSC)
1. Active Directory
2. Amazon Web Services (AWS)
3. Analytical skills
4. Antivirus software
5. Apache
6. Application servers
7. Azure
8. Backup and recovery
9. Basic hardware
10. Cloud computing
11. Collaboration tools
12. Communications
13. Configuration management
14. Databases
15. Data center
16. Data security
17. Data storage
18. Debugging
19. Desktop support
20. Disaster recovery
21. Documentation
22. Electronic mail
23. Encryption
24. Firewalls
25. Groupware
26. Hardware
27. Help desk
28. Internet
29. Intrusion detection
30. LAN
1. Providing technical support for computer hardware and software
2. Resolving technical problems with computer systems
3. Analyzing and resolving technical problems
4. Identifying technical problems and their causes
5. Diagnosing and troubleshooting technical problems
6. Repairing and replacing defective parts
7. Installing and configuring computer systems
8. Updating software and drivers
9. Monitoring and maintaining computer systems
10. Testing and repairing computer networks
11. Training users on new computer systems and software
12. Providing customer service and technical support
13. Creating and maintaining documentation for computer systems
14. Coordinating with other departments to resolve technical problems
15. Escalating technical problems to higher level of support
16. Monitoring system performance and capacity
17. Planning and implementing system upgrades
18. Troubleshooting system errors and crashes
19. Investigating and diagnosing network problems
20. Configuring and managing network servers
21. Securing computer systems against malware and attacks
22. Planning and implementing disaster recovery procedures
23. Creating and managing user accounts
24. Granting and revoking user access to computer systems
25. Monitoring user activity
26. Detecting and investigating security breaches
27. Responding to service outages and emergencies
28. Performing routine system maintenance
29. Configuring and managing firewalls
30. Configuring and managing routers and switches
31. Configuring and managing DHCP and DNS servers
32. Configuring and managing web servers
33. Configuring and managing email servers
34. Monitoring and troubleshooting server performance
35. Managing storage and backups
36. Creating and managing databases
37. Creating and managing user accounts
38. Granting and revoking user access to databases
39. Monitoring user activity
40. Detecting and investigating security breaches
41. Responding to service outages and emergencies
42. Performing routine system maintenance
43.Configuring and managing virtualization software
44. Creating and managing virtual machines
45. Monitoring and troubleshooting virtual machine performance
46. Managing storage for virtual machines
47. Backing up and restoring virtual machines
48. Planning and implementing disaster recovery for virtual machines
49. Creating and managing user accounts
50. Granting and revoking user access to virtual machines
51. Monitoring user activity
52. Detecting and investigating security breaches
53. Responding to service outages and emergencies
54. Performing routine system maintenance
55. Configuring and managing network security
56. Configuring and managing access control
57. Configuring and managing encryption
58. Implementing and managing security policies
59. Monitoring and troubleshooting security
60. Investigating and responding to security incidents
61. Creating and managing user accounts
62. Granting and revoking user access to computer systems
63. Monitoring user activity
64. Detecting and investigating security breaches
65. Responding to service outages and emergencies
66. Performing routine system maintenance
67. Providing Tier 1 support
68. Providing Tier 2 support
69. Providing Tier 3 support
70. Providing Tier 4 support
71. Monitoring ticket queues
72. Assigning tickets to support staff
73. Escalating tickets to higher levels of support
74. Closing tickets
75. Providing status updates to customers
76. Following up with customers after ticket resolution
77. Creating and maintaining support documentation
78. Creating and maintaining knowledge base articles
79. Training new support staff
80. Performing quality assurance on support services
81. Planning and implementing system improvements
82. Monitoring customer satisfaction levels
83. Investigating and resolving customer complaints
84. Coordinating with other departments to resolve customer issues
85. Providing feedback to management on customer satisfaction levels
86. Analyzing customer support trends
87. Implementing customer support best practices
88. Managing customer support staff
89. Creating and managing customer support reports
90. Monitoring customer support metrics
91. Identifying and resolving customer support issues
92. Planning and implementing customer support improvements
93. Managing customer support budgets
94. Monitoring customer support performance
95. Evaluating customer support staff
96. Hiring and firing customer support staff
97. Training customer support staff
98. Creating and managing customer support training programs
99. Evaluating customer support training programs
100. Implementing customer support process improvements
1. Cyber security research skills
2. Security analysis and assessment skills
3. Security system design and implementation skills
4. Security policy development and management skills
5. Risk management and mitigation skills
6. Incident response and management skills
7. Security awareness and training skills
8. Security auditing and compliance skills
9. Cryptography and data security skills
10. Network security skills
11. Web security skills
12. Mobile security skills
13. Cloud security skills
14. Industrial control systems security skills
15. Internet of Things security skills
16. Big data security skills
17. Blockchain security skills
18. Artificial intelligence security skills
19. Cyber warfare skills
20. Cyber intelligence skills
- I.T Support
- Cyber Security
1. Providing technical support for computer systems and software
2. Identifying and diagnosing computer system and software problems
3. Resolving computer system and software issues
4. Configuring and installing computer systems and software
5. Updating and maintaining computer systems and software
6. Monitoring and maintaining computer networks
7. Troubleshooting computer network problems
8. Securing computer systems and networks
9. Identifying and responding to computer security threats
10. Conducting computer security audits
11. Implementing computer security measures
12. researching and evaluating new computer technologies
13. Planning and implementing computer system upgrades
14. Training users on new computer systems and software
15. Providing technical support for mobile devices
16. Identifying and diagnosing mobile device problems
17. Resolving mobile device issues
18. Configuring and installing mobile device software
19. Updating and maintaining mobile device software
20. Securing mobile devices
21. Identifying and responding to mobile device security threats
22. Conducting mobile device security audits
23. Implementing mobile device security measures
24. researching and evaluating new mobile technologies
25. Planning and implementing mobile device system upgrades
26. Training users on new mobile devices and software
27. Providing technical support for web-based applications
28. Identifying and diagnosing web-based application problems
29. Resolving web-based application issues
30. Configuring and installing web-based applications
31. Updating and maintaining web-based applications
32. Securing web-based applications
33. Identifying and responding to web-based application security threats
34. Conducting web-based application security audits
35. Implementing web-based application security measures
36. researching and evaluating new web-based technologies
37. Planning and implementing web-based application system upgrades
38. Training users on new web-based applications
39. Providing technical support for database systems
40. Identifying and diagnosing database system problems
41. Resolving database system issues
42. Configuring and installing database systems
43. Updating and maintaining database systems
44. Securing database systems
45. Identifying and responding to database security threats
46. Conducting database security audits
47. Implementing database security measures
48. researching and evaluating new database technologies
49. Planning and implementing database system upgrades
50. Training users on new database systems
1. Providing Tier 1 and Tier 2 support for Cyber Security issues
2. Investigating and responding to Cyber Security incidents
3. Conducting Cyber Security awareness training
4. Maintaining and updating Cyber Security policies and procedures
5. Performing vulnerability assessments and penetration testing
6. Managing Cyber Security risk assessments
7. Conducting security audits
8. Implementing security controls
9. Monitoring and responding to security events
10. Investigating and resolving security incidents
11. Generating security reports
12. Maintaining security tools and devices
13. Performing security research
14. Providing security consulting services
15. Managing security projects
16. Creating and maintaining security documentation
17. Designing and implementing security solutions
18. Investigating new security threats
19. Recommending security improvements
20. Coordinating with other departments on Cyber Security issues
21. Performing regular system and security scans
22. Analyzing scan results and taking appropriate action
23. Monitoring security mailing lists and alerts
24. Keeping up to date on new security vulnerabilities and threats
25. Applying security patches and updates
26. Configuring and managing security devices
27. Monitoring network traffic for suspicious activity
28. Investigating and responding to security alerts
29. Analyzing system logs for security events
30. Identifying and responding to potential security risks
31. Enhancing security awareness among users
32. Implementing security best practices
33. Investigating and resolving access control issues
34. Performing user account management
35. Managing security permissions and roles
36. Implementing least privilege principles
37. Enforcing password policies
38. Monitoring user activity
39. Responding to security policy violations
40. Coordinating with law enforcement on Cyber Security investigations
41. Supporting legal proceedings related to Cyber Security
42. Providing expert testimony on Cyber Security matters
43. Collecting and preserving evidence for Cyber Security investigations
44. Performing forensics analysis on digital evidence
45. Generating reports on Cyber Security findings
46. Presenting findings to management and other stakeholders
47. Recommending corrective action for Cyber Security deficiencies
48. Implementing remediation plans for Cyber Security vulnerabilities
49. Conducting post-incident reviews
50. Updating Cyber Security plans and procedures
Core Qualifications
1. Proven experience as a cyber security specialist and researcher in computer lab.
2. In-depth knowledge of cyber security threats and countermeasures.
3. Strong analytical and problem-solving skills.
4. Excellent communication and interpersonal skills.
5. Ability to work independently and as part of a team.
6. Strong time management and organizational skills.
7. Ability to handle multiple tasks and meet deadlines.
8. Proficient in computer applications and software relevant to the field of cyber security.
9. Excellent research skills.
10. Ability to think critically and creatively.
11. Excellent written and verbal communication skills.
12. Ability to work effectively under pressure.
13. Strong attention to detail.
14. Ability to plan and execute projects.
15. Strong analytical and problem-solving skills.
16. Excellent communication and interpersonal skills.
17. Ability to work independently and as part of a team.
18. Strong time management and organizational skills.
19. Ability to handle multiple tasks and meet deadlines.
20. Proficient in computer applications and software relevant to the field of cyber security.
21. Excellent research skills.
22. Ability to think critically and creatively.
23. Excellent written and verbal communication skills.
24. Ability to work effectively under pressure.
25. Strong attention to detail.
Protect Your Data with Hard Disk Encryption and Regular Backups
Becoming Invisible Online: The Benefits and Risks of Using TOR, VPNs and Mesh Networks
Create a Secure Passphrase: 4 Tips for Keeping Your Accounts Safe