Maruf Farhan

Maruf Farhan

MSc in Cybersecurity| Research Assistant & Published Author AI & Threat Intelligence Research Collaborator Comptia Security+ Certified| | Blockchain Fan | Cybersecurity Blogger | Expert Technical Support @ Kaspersky Lab

London, England, United Kingdom
1K followers 500+ connections

About

As a Computer Science Teacher at Engage Education, I teach Computer Science topics such as Python, Algorithms, Cybersecurity and networking topics to students using interactive and inclusive methods. I hold an MSc in Cybersecurity from Northumbria University with Distinction, where I conducted and published cutting-edge research on wireless security and Blockchain in collaboration with Professors and fellow researchers.

I have six years of experience in the IT technical support industry, where I developed and demonstrated strong skills in troubleshooting, problem-solving, communication, and customer service. I have also earned multiple certifications from CompTIA and Kaspersky Lab, showcasing my proficiency and knowledge in various aspects of cybersecurity. I am passionate about learning new tools and technologies, such as Splunk, and applying them to real-world scenarios. My goal is to become a proficient and professional cybersecurity analyst and researcher and to make a positive impact on the cybersecurity field.

Articles by Maruf

See all articles

Contributions

Experience

  • Engage Education Graphic

    Computer Science Teacher

    Engage Education

    - Present 9 months

    London, England, United Kingdom

    •Taking class lessons according to the curriculum and lesson plans provided.
    •Adapting teaching methods to accommodate different learning styles and abilities.
    •Maintaining a positive and inclusive classroom environment.
    •Effectively managing student behavior and ensuring a conducive learning atmosphere.
    •Resource Utilization from the available resources provided by the school.
    •Utilizing available teaching resources, including technology and educational tools, enhances the…

    •Taking class lessons according to the curriculum and lesson plans provided.
    •Adapting teaching methods to accommodate different learning styles and abilities.
    •Maintaining a positive and inclusive classroom environment.
    •Effectively managing student behavior and ensuring a conducive learning atmosphere.
    •Resource Utilization from the available resources provided by the school.
    •Utilizing available teaching resources, including technology and educational tools, enhances the learning experience.
    •Communicating effectively with student and their teachers about the class and their performance.

  • Northumbria University Graphic

    Research Assistant

    Northumbria University

    - 1 year 1 month

    London, England, United Kingdom

    • Participated in regular meetings with Professors and the department dean to define and explore specialized research topics.
    • Conducted hands-on experiments and lab work, utilizing advanced methodologies.
    • Analyzed experimental data, collaborated with team members, and contributed to meaningful conclusions.
    • Initiated the development of a research journal focused on the cybersecurity field (IoT, Blockchain).
    • Independently drafted journal articles, ensuring comprehensive…

    • Participated in regular meetings with Professors and the department dean to define and explore specialized research topics.
    • Conducted hands-on experiments and lab work, utilizing advanced methodologies.
    • Analyzed experimental data, collaborated with team members, and contributed to meaningful conclusions.
    • Initiated the development of a research journal focused on the cybersecurity field (IoT, Blockchain).
    • Independently drafted journal articles, ensuring comprehensive coverage of research findings and methodologies.
    • Engaged in collaborative analysis sessions with fellow research associates, fostering a dynamic research environment.
    • Communicated progress updates to Professors and incorporated feedback into ongoing research activities.
    • Conducted extensive literature reviews to identify gaps and opportunities.
    • Synthesized and critically analyzed existing research to inform the development of original contributions.
    • Played a crucial role in successfully publishing research findings in reputable journals, conference papers, and book chapters.

  • TryHackMe Graphic

    CTF Player

    TryHackMe

    - 1 year 4 months

    Dhaka, Bangladesh

    Case solving and update writeup.
    Learning concept of Architecture and System Design.
    Security modules

  • Dream Group Graphic

    IT Support Specialist

    Dream Group

    - 5 months

    Dhaka, Bangladesh

    install and configure computer hardware operating systems and applications
    monitor and maintain computer systems and networks
    talk staff or clients through a series of actions, either face-to-face or over the phone, to help set up systems or resolve issues
    troubleshoot system and network problems, diagnosing and solving hardware or software faults
    replace parts as required
    provide support, including procedural documentation and relevant reports
    follow diagrams and written…

    install and configure computer hardware operating systems and applications
    monitor and maintain computer systems and networks
    talk staff or clients through a series of actions, either face-to-face or over the phone, to help set up systems or resolve issues
    troubleshoot system and network problems, diagnosing and solving hardware or software faults
    replace parts as required
    provide support, including procedural documentation and relevant reports
    follow diagrams and written instructions to repair a fault or set up a system
    support the roll-out of new applications
    set up new users' accounts and profiles and deal with password issues
    respond within agreed time limits to call-outs
    work continuously on a task until completion (or referral to third parties, if appropriate)
    prioritise and manage many open cases at one time
    rapidly establish a good working relationship with customers and other professionals, such as software developers
    test and evaluate new technology
    conduct electrical safety checks on computer equipment.

  • Concentrix Graphic

    Sr. Security Support Engineer

    Concentrix

    - 4 years 1 month

    Malaysia

    Executing support as L3 Ban 2B technical expert for Enterprise customers (via Remedy CSS).
    This is direct communication with R&D and VirusLab analysts (Antispam, Ant phishing, Antivirus, WRT, AMz ), raising issues/bugs/cases and delivering solutions for customers, including complete troubleshooting, testing (this part also relates to new versions and products testing) and resolution scenarios (within SLA and KPI). Primarily working with Linux (CentOS / RHEL) and Windows-based products, as…

    Executing support as L3 Ban 2B technical expert for Enterprise customers (via Remedy CSS).
    This is direct communication with R&D and VirusLab analysts (Antispam, Ant phishing, Antivirus, WRT, AMz ), raising issues/bugs/cases and delivering solutions for customers, including complete troubleshooting, testing (this part also relates to new versions and products testing) and resolution scenarios (within SLA and KPI). Primarily working with Linux (CentOS / RHEL) and Windows-based products, as well as virtualization platforms – VMware, KVM, Hyper-V according to our products system requirements internal Lab environments for deployment and testing / reproducing scenarios, Professional services – participation in PoCs and deployment/configuration of our products in customers' infrastructure.Knowledge and documentation sharing in Jira / Confluence, reporting part via PowerBI, remote sessions with customers via Bomgar / MS Teams / WebEx / etc.
    Before L3, I worked as an L2 Technical Account Manager, primarily working directly with MSA Enterprise customers (all technical and organizational questions, contracts management, and presales activations). After one year, I was promoted to L3 Technical Support Engineer after 1 year.
    It has successfully passed more than 20 internal exams.

  • AKIJ GROUP Graphic

    Sales And Marketing Specialist

    AKIJ GROUP

    - 1 year 5 months

    Tejgaon , Saatrasta

    oDeveloped new customer base to inform about AKIJ MOTORS.
    oMarket analyzes and developing plans to improve our Service.
    oProviding daily report and market forecasts as per client requirement.
    oFollow up.
    oCreating New Branding strategy and plan for Akij Motors
    oHandling staffs attendance, overtime, leave etc maintaining & reporting to higher authority.
    oExperienced to maintaining properly & confidentially of the personals files of all employee(s) of AKIJ MOTORS, AKIJ GAS, and…

    oDeveloped new customer base to inform about AKIJ MOTORS.
    oMarket analyzes and developing plans to improve our Service.
    oProviding daily report and market forecasts as per client requirement.
    oFollow up.
    oCreating New Branding strategy and plan for Akij Motors
    oHandling staffs attendance, overtime, leave etc maintaining & reporting to higher authority.
    oExperienced to maintaining properly & confidentially of the personals files of all employee(s) of AKIJ MOTORS, AKIJ GAS, and AKIJ COMPUTER & ONLINE.
    oAssisting to collect potential CVs, review & short listed; arrange interview(s) and reports and issuing appointment letter for the new employee(s).
    oEvaluating performance appraisal for all employee(s).
    oExperience on handling Staffs events (outing, seminar, training, sports, foods etc).
    oHandling to prepare monthly payroll, compensation etc.
    oDeveloped HR, employment and service policy for AKIJ MOTORS.
    oMonitor other marketing team such as service marketing, garage equipment marketing.
    oPreparing meeting agenda.
    oAny others duty assigned by the management.
    oSMS marketing and Email marketing for the upcoming event and offer made by AKIJ group and AKIJ Motors limited.
    oMake contact with foreign correspondent for Importing new automobiles and spare parts.

Education

  • Northumbria University Graphic

    Northumbria University

    MSc in Cybersecurity Cybersecurity

    -

  • North South University Graphic

    North South University

    Bachelor of Business Administration (BBA) Marketing

    -

    Activities and Societies: Photography club Earth CLub

  • Northumbria University Graphic

    Northumbria University

    Master of Science - MS Cybersecurity Distinction

    -

    MSc in Cybersecurity - Northumbria University (2022-2023) with Distinction
    Thesis: Utilizing Blockchain Technology to Detect Fake Products.
    Courses: Networking, Information Governance, Wireless Security, Ethical Hacking, Information Risk Management, and Research Methodology.

Licenses & Certifications

Courses

  • Literature review

    -

  • Quantitative Analysis

    -

  • Research Methodology

    -

Projects

  • Improving threat intelligence using the power of AI

    Research collaboration on Improving threat intelligence using the power of AI
    Position: Research Assistant
    Supervisor:
    Prof. Dr. Usman Butt (Associate Dean and Head of Computing Engineering)
    Prof. Dr Abdul Salih (Asst. Professor in cybersecurity/AI, Department of Computer Engineering
    Institution: Northumbria University
    Duration: 12th December to Continuing (4 Months project)

  • Enhancing Secure Access and Authorization in Healthcare IoT through an Innovative Framework: Integrating OAuth, DIDs, and VCs

    -

    Protecting patient information's confidentiality is paramount considering the widespread use of Internet of Things (IoT) gadgets in medical settings. This study's subjects are decentralized identifiers (DIDs) and verifiable credentials (VCs) in conjunction with an OAuth-based authorization framework, as they are the key to protecting IoT healthcare devices. DIDs enable autonomous authentication and trust formation between IoT devices and other entities. To authorize users and enforce access…

    Protecting patient information's confidentiality is paramount considering the widespread use of Internet of Things (IoT) gadgets in medical settings. This study's subjects are decentralized identifiers (DIDs) and verifiable credentials (VCs) in conjunction with an OAuth-based authorization framework, as they are the key to protecting IoT healthcare devices. DIDs enable autonomous authentication and trust formation between IoT devices and other entities. To authorize users and enforce access controls based on verified claims, VCs offer a secure and adaptable solution. Through the proposed framework, medical facilities can improve the privacy and security of their IoT devices while streamlining access control administration. An Smart pill dispenser in a hospital setting is used to illustrate the advantages of this method. The findings demonstrate the value of DIDs, VCs, and OAuth-based delegation in protecting IoT devices. Improved processes for authorizing and controlling access to IoT devices are possible thanks to the research findings, which also help ensure patient confidentiality in the healthcare sector.

    Other creators
  • Eavesdropping in Bluetooth Networking

    -

    This research paper aims to figure out how easy it is to break into Bluetooth networks and listen in on conversations. So, the technical details of this vulnerability will be examined, as well as how cybercriminals use this type of network intrusion, how it influences network security and the hazards that eavesdropping in Bluetooth networks provides to an organization's networks or other sorts of enterprises.

    Other creators
  • Enhancing Secure Access and Authorization in Healthcare IoT through an Innovative Framework: Integrating OAuth, DIDs, and VCs

    -

    Protecting patient information's confidentiality is paramount considering the widespread use of Internet of Things (IoT) gadgets in medical settings. This study's subjects are decentralized identi-fiers (DIDs) and verifiable credentials (VCs) in conjunction with an OAuth-based authorization framework, as they are the key to protecting IoT healthcare devices. DIDs enable autonomous au-thentication and trust formation between IoT devices and other entities. To authorize users and enforce access…

    Protecting patient information's confidentiality is paramount considering the widespread use of Internet of Things (IoT) gadgets in medical settings. This study's subjects are decentralized identi-fiers (DIDs) and verifiable credentials (VCs) in conjunction with an OAuth-based authorization framework, as they are the key to protecting IoT healthcare devices. DIDs enable autonomous au-thentication and trust formation between IoT devices and other entities. To authorize users and enforce access controls based on verified claims, VCs offer a secure and adaptable solution. Through the proposed framework, medical facilities can improve the privacy and security of their IoT devices while streamlining access control administration. An Smart pill dispenser in a hospital setting is used to illustrate the advantages of this method. The findings demonstrate the value of DIDs, VCs, and OAuth-based delegation in protecting the IoT devices. Improved processes for authorizing and controlling access to IoT devices are possible thanks to the research findings, which also help ensure patient confidentiality in the healthcare sector. CCS CONCEPTS • Security and privacy → Usability in security and privacy.

    Other creators

Languages

  • English

    Full professional proficiency

  • Bangla

    Native or bilingual proficiency

  • German

    Elementary proficiency

  • Hindi

    Limited working proficiency

Organizations

  • AKIJ Group

    HR and Admin Officer, Incharge of Equipment Marketing

    - Present

Recommendations received

5 people have recommended Maruf

Join now to view

View Maruf’s full profile

  • See who you know in common
  • Get introduced
  • Contact Maruf directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Maruf Farhan

Add new skills with these courses