Portrait of Rehan Ahmad

Rehan Ahmad

Linux Administrator • Cybersecurity Enthusiast • DevOps Engineer

Risk-Assessment RedTeam Network Security Penetration Testing CI/CD Pipelines Containerization

Red Team enthusiast — skilled in offense, defense, and breaking systems to build them stronger.

About Me

I am a Red Team enthusiast passionate about exploring the offensive side of cybersecurity. My focus is on understanding how systems can be broken, exploited, and hardened to ensure stronger defenses. With a solid foundation in Linux, DevOps, and system administration, I approach security from both technical and strategic angles. My skills cover vulnerability assessments, exploitation techniques, incident response, and system hardening. I thrive on simulating real-world attacks to uncover weaknesses before adversaries do, while also collaborating with defenders to strengthen digital infrastructure. Driven by curiosity and a problem-solving mindset, I aim to bridge the gap between offense and defense — helping organizations stay resilient in the face of evolving threats.

Education

BSc in Cyber Security

Air University of Pakistan

Focus on cybersecurity, web development and systems programming. Coursework includes algorithms, networks and security fundamentals.

Intermediate (ICS)

Superior College (Federal Board)

Science stream with Computer Science electives. Participated in coding contests and tech clubs.

Cyber Security

Al Nafi International College

Completed Cybersecurity training with AlNafi, focusing on ethical hacking, penetration testing, and system defense. Gained hands-on experience in threat detection, vulnerability assessment, and real-world attack simulations.

Cyber Security

Chief Information Security Officer

Through Cisco Networking Academy, I built a strong foundation in cybersecurity by exploring threat landscapes, attack types, and defense strategies. I learned how to secure endpoints against malware and unauthorized access, while also understanding layered defense, monitoring, and incident response techniques to strengthen systems against evolving cyberattacks.

Experience

Cybersecurity

2025 - Present

Practical experience in vulnerability assessments, penetration testing, and red team operations. Skilled in identifying security gaps, simulating real-world attacks, and implementing defense strategies. Worked on system hardening, risk assessment, and incident response to ensure strong and resilient infrastructures.

DevOps

2025 - Present

Hands-on exposure to containerization, orchestration, and CI/CD pipelines. Experienced in securing deployments, managing cloud environments, and implementing automation for scalable and efficient operations. Focused on integrating monitoring and security practices within DevOps workflows.

Linux

2025 - Present

Proficient in Linux administration and security, including service management, user permissions, and process control. Skilled in Bash scripting, automation, and troubleshooting. Experienced in configuring and securing network services, scheduling with Cron, and applying security best practices across distributions.

Programming & Editing

2025 - Present

Developed skills in Python for automation, data handling, and security scripting. Combined technical knowledge with creativity through editing tools like Canva, Adobe Photoshop, and After Effects. Experienced in designing visual content, animations, and presentations, blending both programming and creative workflows.

Skills

DevOps

Docker 95%
Kubernetes 90%
Jenkins 85%

Cybersecurity

Kali Linux 80%
Ethical Hacking 75%
Penetration Testing 70%

Linux

User Management 85%
Networking 80%
Automation 75%

Programming & Editing

Python 80%
Canva 75%
Adobe 70%

Certifications

Introduction to Cybersecurity
CISCO
September 20, 2025

Gained foundational knowledge of cybersecurity concepts, including threat landscapes, attack vectors, and the importance of digital security. Learned about the principles of confidentiality, integrity, and availability (CIA triad), along with basic strategies to protect individuals and organizations against cyber risks.

Network Defense
CISCO
September 19, 2025

Developed understanding of defensive security measures, focusing on firewalls, intrusion detection/prevention systems, and layered defense strategies. Learned how to monitor, detect, and respond to malicious activities while ensuring network resilience against evolving cyber threats.

Contact Me

Interested in collaborating or have a question? Reach out — I respond to thoughtful messages.