SA

Shaikh Azhar

Lead - Threat Defense Operations at Injazat Data Systems LLC

Shaikh Azhar has a strong background in cybersecurity and network analysis. Shaikh has worked at various companies, starting with IBM from 2011 to 2013 as a Network Analyst. Shaikh then joined Tata Consultancy Services in 2014 as an Information Security Analyst. In 2015, they moved to Mastercard and served as an Information Security Analyst until 2017. Following that, they worked at HP as a Cyber Security Analyst from 2017 to 2018. In 2018, they joined Help AG as a Senior Cyber Security Analyst. Most recently, they have been working at Injazat since 2019, first as a Cyber Threat Intelligence Specialist and currently as the Lead - Threat Defense Operations.

Shaikh Azhar's education history begins with attending SMS High School, where they completed their SSC (Secondary School Certificate) qualification. Following that, they pursued their Bachelor's degree in Computer Science from Saint Marys, although the specific start and end years are not mentioned.

In addition to their formal education, Shaikh Azhar obtained several certifications related to cybersecurity and network security. Shaikh completed the EC-Council's EC-CEH certification in December 2018 and the GIAC Cyber Threat Intelligence GCTI FOR578 certification from GIAC Certifications in July 2022.

Shaikh Azhar also acquired the C | TIA - Certified Threat Intelligence Analyst certification from EC-Council, the CHFI Computer Hacking Forensic Investigator Certification from EC-Council, and participated in the Cyber Threat Hunting Training - April Session offered by Active Countermeasures. Furthermore, they completed the End User Network Security and PCI/DSS certifications from Cybrary, the Recorded Future Certified User certification from Recorded Future, and the Splunk Certified Power User and Splunk Certified User certifications from Splunk.

Overall, Shaikh Azhar has a strong educational background in computer science and has supplemented their knowledge with various certifications and training in the field of cybersecurity.

Links


Org chart