Meisam Eslahi, Ph.D.

CEO

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia20 yrs 2 mos experience
Most Likely To SwitchHighly Stable

Key Highlights

  • Over 24 years of cybersecurity experience
  • Expert in building high-performing cybersecurity teams
  • Proven track record in engaging C-suite stakeholders
Stackforce AI infers this person is a Cybersecurity Expert with extensive experience in enterprise risk management and incident response.

Contact

Skills

Core Skills

CybersecurityCyber OperationsIncident Response

Other Skills

Mitigation StrategiesTeam ManagementCross-functional Team LeadershipIT Security OperationsCybersecurity Incident ResponseIT Security Policies & ProceduresStakeholder EngagementCyber Security RiskStrategic InitiativesCyber Threat HuntingData PrivacyApplication SecurityCyber DefenseCybercrimeData Security

About

A cybersecurity practitioner with over 24 years of experience spanning IT, operations, consulting, and advisory services, translating deep technical expertise into measurable business outcomes, regulatory confidence, and cyber resilience. He specializes in building and scaling global portfolios, service lines, delivery models, and business growth initiatives, while developing multidisciplinary teams, skills, and capabilities that deliver complex, risk-aligned services to multinational and highly regulated organizations. CORE CYBERSECURITY EXPERTISE: • Offensive Security, Adversary Simulation & Attack Surface Management • Cyber Defense, Detection, Response & Monitoring [Reactive | Proactive] • Threat Modeling, Secure Design & Configuration Assurance • Technical, Operational, Enterprise & Business Risk Management • Policies, Standards, Procedures & Playbooks [Client Engagements | Internal Operating Models] • Emerging Tech–Driven Cyber Defense, Offensive Security & Ops [AI-enabled | Intelligence-led] *Aligned with national and international regulatory and industry best practices.

Experience

Ec-council global services

3 roles

Executive Director

Promoted

Apr 2023Present · 3 yrs

  • Cybersecurity Strategy, Portfolio & Operating Model: Defined, owned, and scaled global cybersecurity strategy, go-to-market approach, and multi-domain service portfolio across 30+ end-to-end services, aligning capability roadmaps, methodologies, and operating models with business objectives and market demand.
  • Delivery Governance, Execution & Technical Authority: Owned end-to-end delivery governance and execution oversight for complex, multinational cybersecurity engagements, accountable for scoping, execution control, quality assurance, and risk-aligned outcomes, while providing senior technical direction on advanced assessments.
  • Leadership, Talent Development & Organizational Scale: Built and scaled high-performing cybersecurity organizations through talent acquisition, capability development, mentoring, and leadership layering, reducing key-person dependency and strengthening long-term delivery resilience.
  • Executive, Client & Commercial Engagement: Engaged C-suite and Board stakeholders to translate cybersecurity risk into business-aligned decisions, while supporting go-to-market, presales, and client expansion activities to increase engagement scope and commercial value.
Mitigation StrategiesTeam ManagementCross-functional Team LeadershipCyber OperationsIT Security OperationsCybersecurity Incident Response+23

Senior Director - Cyber Security

Promoted

Apr 2021Mar 2023 · 1 yr 11 mos

  • Built and matured global cybersecurity practices, overseeing delivery across 30+ offensive and defensive service lines.
  • Owned end-to-end delivery governance for complex global engagements, including scoping, planning, feasibility analysis, execution oversight, quality assurance, and technical control.
  • Standardized global methodologies and delivery models, improving consistency, scalability, operational efficiency, and cross-regional execution.
  • Built and scaled high-performing multidisciplinary teams, driving capability development, internal technical training, mentoring, supporting go-to-market and presales activities, and contributing to senior management decision-making, business planning, and market and client evaluation.
Mitigation StrategiesCross-functional Team LeadershipIncident ManagementCyber OperationsKali LinuxTeam Management+15

Technical Director - Cyber Security

Feb 2019Apr 2021 · 2 yrs 2 mos

  • Led the delivery of complex cybersecurity engagements, providing hands-on technical leadership across vulnerability assessment, penetration testing, red teaming, and advanced security assessments.
  • Designed and maintained technical roadmaps, methodologies, and best practices to support consistent execution by multidisciplinary teams.
  • Provided technical direction during engagements, guiding teams on tools, techniques, and advanced approaches aligned to client risk objectives.
  • Supported client relationship management and opportunity identification, contributing technical input to expand engagement scope.
  • Recruited, developed, and managed high-performance cybersecurity teams, including performance management, mentoring, and skills development.
Mitigation StrategiesCross-functional Team LeadershipIncident ManagementCyber OperationsKali LinuxTeam Management+14

Provintell cyber security

Technical Director - Cyber Security Incident Response

May 2017Jan 2019 · 1 yr 8 mos · Malaysia

  • Led incident response, digital forensics, threat hunting, and compromise assessment engagements, providing hands-on technical leadership across proactive and reactive scenarios.
  • Designed and maintained IR and DFIR policies, SOPs, and operational procedures, strengthened consistency, readiness, and execution quality across engagements.
  • Led threat intelligence and hunting initiatives, correlating adversary activity with attack vectors and translating findings into actionable mitigation recommendations.
  • Established and led SOC detection and automation capabilities, designing detection logic, workflows, and response processes, and applying advanced data analysis and correlation techniques to improve detection accuracy, investigation efficiency, and response effectiveness.
Mitigation StrategiesCross-functional Team LeadershipIncident ManagementCyber OperationsKali LinuxTeam Management+24

Kpmg malaysia

Manager - Information Protection and Business Resilience

Apr 2016Apr 2017 · 1 yr

  • Managed multiple cybersecurity engagements, including vulnerability assessment and penetration testing (network, application, OS), incident response, digital forensics, and security risk assessment for enterprise and regulated clients.
  • Led advanced incident response and digital forensics investigations, performing root cause analysis and supporting containment and remediation for clients in the financial, banking, and telecommunications sectors.
  • Developed and customized scripts, applications, and technical tooling to support advanced threat monitoring and vulnerability management, contributing to long-term, large-scale client engagements.
  • Supported regional collaboration and capability development, contributing to the KPMG Cyber Academy and coordinating with APAC cybersecurity teams (including Australia and New Zealand) under the Strategic Growth Initiative (SGI).
Mitigation StrategiesCross-functional Team LeadershipCyber OperationsKali LinuxTeam ManagementIT Security Operations+11

Asia pacific university of technology and innovation (apu / apiit)

Industry Adviser and Lecturer - Cyber Security

Jan 2014Mar 2016 · 2 yrs 2 mos · Malaysia

  • Subject Matter Expert leading cybersecurity and digital forensics teaching, research teams, and student communities, and contributing to core modules in cybersecurity, incident response, and digital forensics.
  • Designed and delivered industry-aligned curricula, including course structures, lesson plans, lecture content, practical labs, assessments, and schemes of work in line with national and international quality assurance standards. Both for degree and master's level, based on the Malaysian Qualifications Agency (MQA)
  • Implemented industry-based teaching strategies to bridge theory and real-world practice, improving student engagement, applied skills, and professional readiness.
  • Research and industry collaborations, supervised final-year projects, and mentored students for national and international technical competitions.
  • APU IEEE student branch founder and Counselor: Formation of APU IEEE Student Branch, Formation of APU IEEE Computer Society, Formation of APU IEEE Communication Society, Formation of APU IEEE Computational Intelligence Society, Organizing International IEEE Conference (SCOReD 2015).
  • Founder of the first Malaysian ISACA student group at APU.
  • Founder of the first Malaysian CompTIA Academy Partner at APU.
Cyber OperationsSecurityTechnical TrainingTenable NessusCyber Security RiskData Privacy+1

Barbodtech

3 roles

Principal Adviser (Remote Role) – Cybersecurity

Promoted

Apr 2012Dec 2013 · 1 yr 8 mos

  • Coordinate with managing directors and C-levels to design cybersecurity strategies that align with BarbodTech group's core business goals and objectives.
  • Provide technical cybersecurity roadmaps for new projects and products that balance innovation, security, and operability.
  • Regularly reviews standard operating procedures and protocols to ensure the security unit continues to meet operational requirements effectively.
  • Lead and manage complex security assessments and penetration testing to improve the cyber hygiene of BarbodTech group people, process, and technology.
Cyber OperationsIT Security OperationsCybersecurity Incident ResponseRisk AssessmentSecurityTechnical Training+4

Senior Manager – Information Security

Promoted

Aug 2011Mar 2012 · 7 mos

  • Define, plan, develop and manage BarbodTech Group information security risks management processes to safeguard all branches to perform the business mission.
  • Define and develop up-to-date procedures and best practices in the security space of new products (hardware/software), features, framework components, and wireless infrastructure.
  • Conduct proactive research to identify security threats that may affect BarbodTech products, applications, networks, and its client's infrastructure, along with operational action plans to minimize the impacts.
  • Work with the internal stakeholders to translate complex information security issues into business risk followed by countermeasures.
  • Develop threat models and verify the existing security mitigations strategies required for BarbodTech products and the clients
IT Security OperationsSecurity

Manager – Information Security

Jul 2010Jul 2011 · 1 yr

  • Act as the primary security representative to the development and infrastructure teams and provide them with information security oversight.
  • Work closely with hardware and software engineers on new product launches to understand each device's specific builds and needs to identify security issues early in the development cycle.
  • Perform comprehensive research to document vulnerabilities, relevant exploits, and the attack surface for BarbodTech products, including hardware, applications, and frameworks.
  • Formulate various security test cases to assess BarbodTech products' security based on the client's operational infrastructure.
IT Security OperationsSecurity

University of malaya

Research Assistant – Network Security

Apr 2012Feb 2013 · 10 mos · Malaysia

  • Contribute as a lead researcher to identify the new area of research in cybersecurity.
  • Participate in scholarly activities as a member of the UM Security Research Group (SECReg), including research, publications, and conference presentations.
  • Design and develop a comprehensive dataset using real-world Botnets for both mobile and computer networks.
  • Formulate a machine learning-based Botnet/APT detection model with high accuracy for enterprise networks.
Security

Arvin pardaz co.

2 roles

Team Lead - Network Security

Oct 2006Nov 2007 · 1 yr 1 mo

  • Plan, communicate, coordinate, and perform security assessments for network, application, and systems.
  • Perform a continuous assessment to discover, validate, and document security issues in the company/client's networks.
  • Execute security configuration review on company/client's systems and provide system hardening recommendations.
  • Generate detailed configuration testing reports to discuss security issues, business risks, and potential countermeasures.

IT Network Specialist

Jul 2004Sep 2006 · 2 yrs 2 mos

  • Analyze the current network architecture and systems to identify the requirements and perform solutions, planning, and installation.
  • Manage the network devices, servers, firewalls, and network performance monitoring to ensure the resilience of the current network environment.
  • Provide network operation support, problem isolation, and troubleshooting.
  • Design and implement security best practices for network and device configurations and hardening.
IT Security OperationsSecurity

Ervin samane part (esp) co.

2 roles

Information Technology System Engineer

Apr 2003Jun 2004 · 1 yr 2 mos

  • Perform ongoing server maintenance, including installing or upgrading hardware, software, and upgrades.
  • Conduct problem diagnosis in resolving internet access and computer issues.
  • Monitor and maintain network core solutions to ensure data consistencies.
  • Research, review, and test new hardware, applications, and technology ideas applicable to different departments.

Information Technology System Technician

Aug 2002Mar 2003 · 7 mos

  • Set up workstations, install, and configure the required software and applications.
  • Schedule and perform network maintenance and system upgrades.
  • Provide technical support for systems, networks, and data backup.
  • Provide end-user technical support and issue resolution.

Education

Universiti Teknologi MARA

Doctor of Philosophy (PhD)

Jan 2013Jan 2016

University of Malaya

Master's degree — Computer Science (Network Security)

Jan 2008Jan 2011

Islamic Azad University

Bachelor's degree — Computer Software Engineering

Jan 1999Jan 2003

Stackforce found 100+ more professionals with Cybersecurity & Cyber Operations

Explore similar profiles based on matching skills and experience