Saif Asif

Greater Munich Metropolitan Area
1K followers 500+ connections

Join to view profile

About

Principal Engineer with 12+ years of experience in cloud-native systems, security, and…

Services

Experience & Education

  • Tidely

View Saif’s full experience

By clicking Continue to join or sign in, you agree to LinkedIn’sUser Agreement,Privacy Policy, andCookie Policy.

Licenses & Certifications

Courses

  • Advanced Data strucutures

    -

  • Conceptual Programming - Art of programming

    -

  • High Performance Computing

    -

  • Introduction to Cloud Computing

    -

  • Introduction to Management

    -

  • The Cloud

    -

Projects

  • learning & doing

  • Sample Skeleton Projects

    - Present

    A collection of skeleton projects of various frameworks and architectures. These projects can save precious time that is spent on configuring and upstarting a framework.

    See project
  • Github - MSaifAsif: About me

    My very own github profile about myself !

  • SpexAccess

    -

    Server Side Development in Java(J2EE).
    Front-end Development using jQuery and Bootstrap.

    Other creators
    • Muhammad Zohaib
    • Zaid Ashfaq Ansari
    • Anees Butt
    • Farhat Majeed
    See project
  • Elastica

    -

    Elastica is the leader in Data Science Powered™ Cloud Application Security. Its CloudSOC™ platform empowers the companies to confidently leverage Cloud and SaaS applications while staying safe, secure and compliant.

    Following Elastica Apps on the extensible CloudSOC™ platform enable full life cycle of visibility & security for the Cloud and SaaS applications being used in your company:

    - Audit: Uncovers Shadow IT and highlights vulnerabilities in cloud apps being used by…

    Elastica is the leader in Data Science Powered™ Cloud Application Security. Its CloudSOC™ platform empowers the companies to confidently leverage Cloud and SaaS applications while staying safe, secure and compliant.

    Following Elastica Apps on the extensible CloudSOC™ platform enable full life cycle of visibility & security for the Cloud and SaaS applications being used in your company:

    - Audit: Uncovers Shadow IT and highlights vulnerabilities in cloud apps being used by employees
    - Detect: Uses machine learning to detect intrusions and threats based on account activity in cloud apps
    - Protect: Provides defense against intrusions and compliance violations in cloud apps being used
    - Investigate: Enables forensic investigations on historic account activity on cloud apps being used

    Other creators
    • Maaz B Tariq S.
    • Nabeel Siddiqui
    • Asim Ali
    • Mehdi Hussain
    • Muhammad Asif
    • Ahmed Talha Khan
    • Nabeel Akhtar
    • Muhammad Meraj
    • Muhammad Zohaib
    • Asma Kothari
    See project
  • WellClub

    -

    A social networking application to help improve the life-styles of an individuals

    Other creators
    • Nizaqat Ali
    • Talha Ahmed Khan
    • Ahsan Shaikh
    • Abdul Jalil Soomro
    • Muhammad Wasay Khan
    • Inam Soomro
    • Mohammad Aurangzaib
    • Raheel Siddiqui
    See project
  • Beta Tester for Meercat Manager

    -

    I performed load tests on the product on more than 7 different operating systems with a variety of configurations in order to determine possible failure points in the core application. During the testing process I actively reported back to the Dev-team in order to improve the application and remove further bugs.

    See project
  • Custom Routing Protocol

    -

    To create an open-source , architecture independant and customizable Routing protocol that used hardware capabilities to calculate the most feasible ( and also the least feasible ) path to destination .
    The metrics used by this protocol are summarized as below
    - CPU load (cpu usage). Calculated as average percentage usage of all processors on the host machine
    - Amount of RAM available for processing. Measured by The number of bytes of free memory available to the host
    - Number of…

    To create an open-source , architecture independant and customizable Routing protocol that used hardware capabilities to calculate the most feasible ( and also the least feasible ) path to destination .
    The metrics used by this protocol are summarized as below
    - CPU load (cpu usage). Calculated as average percentage usage of all processors on the host machine
    - Amount of RAM available for processing. Measured by The number of bytes of free memory available to the host
    - Number of idle processors available for processing. Processor is tagged idle if it is either at 0% usage OR is at a lower work load as compared to the other processors

    Other creators
    • Zeeshan Zafar
    • Bilal Asif Mirza
  • Info-ID

    -

    To read hardware sensors from the motherboard from within the windows environment without interacting with the BIOS. Windows Management Interface was implemented .

  • Non - Heuristic Anti-Virus

    -

    The goal was to create a plateform independant portable anti-virus utility. The utility was provided with an updatebale virus defintion file.

Honors & Awards

  • Best Concept

    Microsoft

    Winner for the "Best Concept" art for Microsft IE-10 adwartise competition.
    http://adwartise.com/videos.php?id=29

Test Scores

  • IELTS

    Score: 8.0

  • telc Deutsch B1

    Score: 280/300

View Saif’s full profile

  • See who you know in common
  • Get introduced
  • Contact Saif directly
Join to view full profile

Other similar profiles

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content