Summary
Overview
Work History
Education
Skills
Accomplishments
Personal Profile
Disclaimer
Spoken Languages
Timeline
background-images

Amir Saiyad

Summary

I am a dedicated cybersecurity researcher with over 6+ years of experience specializing in automotive and IoT penetration testing. My expertise includes developing robust firmware solutions and conducting thorough vulnerability assessments across complex systems. Passionate about embracing new challenges, I strive to contribute to advancements in the automotive cybersecurity sector while continuously enhancing my technical skills

Overview

7
7
years of professional experience

Work History

Senior Cybersecurity Researcher

FEV India Pvt Ltd
05.2023 - 03.2025
  • Penetration testing of BLE TPMS for vehicle as research point of view, found the vulnerability and reported it. CVE-2024-39081.
  • Penetration testing of E-BUS from Vinfast at Hexagon studio, Turkey.
  • Part of presenter team for 2 Homologation of Vinfast vehicle. Which is done by IDIADA.
  • Penetration testing of cluster, Infotainment, BCM, Keyfob etc.
  • Penetration testing of medical device and reported vulnerability to Mitre.
  • Penetration testing of IP camera, home automation device.


Automotive and IOT Cybersecurity Engineer

Amynasec Research lab.pvt
09.2019 - 01.2023
  • Automotive Penetration Testing: CAN Protocol, UDS Protocol, LIN Protocol, ETHERNET, USB, BLE, Wi-Fi, GPS, SDR (RF, LF) penetration testing.
  • Hand on experience on automotive vehicle penetration testing (CAN, UDS, BT, Wi-Fi, USB, GPS, RF) at Vinfast, Vietnam.
  • Penetration testing(CAN, UDS) of EV Scooter.
  • IOT Device Penetration Testing: UART Debugging, JTAG Debugging, SPI, I2C, Wi-Fi, Bluetooth, USB, Ethernet penetration testing.
  • Medical Device Penetration Testing.
  • Wireless protocol Penetration Testing like Wi-Fi, Bluetooth, RF, LF, etc.
  • Threat Analysis and Research Assessment (TARA) document making on basis of ISO 21434, R155.
  • Firmware extraction and reverse engineering.
  • Scripting and coding languages for automation.
  • Work on automotive secure CAN prototype.

Associate Router Firmware Developer

XUNISON LTD.
02.2018 - 09.2019
  • Total 1.8-year experience (3 months Training Period)
  • Member of cyber security team.
  • Develop router firmware using buildroot and cross compiler.
  • Developed parental control feature and other cyber features using open-source code.
  • Knowledge of snort and dnsmasq open-source code.
  • Setup serial console using serial connection and upgrade firmware from serial console.
  • Knowledge of the Agile software development life cycle
  • Test router throughput using iperf, Capture packet using packet capturing tool wireshark.
  • Developing and Testing of Router firmware.
  • Network vulnerability scanning and UART pins debugging.
  • Little bit worked on hardware.

Education

Bachelor of Engineering - ECE

G.T.U
Gujrat, India
01.2017

Intermediate - undefined

G.S.H.S.E.B
01.2013

SSC - undefined

G.S.H.S.E.B
01.2011

Skills

  • Additional courses Taken from Vector India institute in Embedded System Field
  • Knowledge in Automotive penetration testing, IOT penetration testing, Networking Programming and penetration testing, Ethical Hacking, IOT, RTOS
  • Vulnerability analysis – Performs routine vulnerability scans against specified systems, analyzes the results
  • Automotive penetration testing: CAN, UDS, SDR (RF, LF), LIN, GPS, Bluetooth, Wi-Fi, Ethernet, USB
  • CAN Analysis tool: CAN-utils, SavvyCan, Bus-master, CANoe
  • IOT penetration testing: UART, I2C, JTAG, Bluetooth, Wi-Fi, etc
  • Programming Languages: C, C, Embedded C, python
  • Hands-on-keyboard experience conducting penetration testing
  • Hands-on-keyboard experience conducting vulnerability scans
  • Knowledge of 8051, pic, AVR (Arduino, Node-Mcu), ARM (LPC2148), STM Hardware
  • Knowledge of buildroot, cross compiler for develops firmware
  • Protocols: CAN, UDS, UART, I2C, SPI, TCP/IP, UDP
  • Operating system: windows, Linux (additionally know Linux programming)
  • Knowledge of Packet capturing and network scanning tools
  • Tools: JIRA, GIT
  • Debugging Tools: Gdb, Valgrind, strace, etc
  • Hands on Android debug bridge commands

Accomplishments

  • CVE-2024-39081 for BLE TPMS.
  • Part of representer and execution team for vehicle homologation at vinfast.
  • Car Hacking Village in Beside Ahmedabad 2021.
  • part of the execution team for the Automotive Cybersecurity Penetration Testing Workshop at the Automotive Research Association of India (ARAI)

Personal Profile

  • Name: Amir Saiyad
  • Father's Name: Azaharhusen saiyad
  • DOB: 18th June 1996
  • Gender: Male
  • Marital Status: Single
  • Nationality: Indian
  • Availability: Immediate
  • Permanent Address: AT-Post: Dungri, Dungar faliya
  • Dist: valsad, Gujarat (396375)

Disclaimer

I hereby declare that the above written particulars are true to the best of my knowledge and belief. Date: Place: (Amir Saiyad)

Spoken Languages

English
Hindi
Gujarati

Timeline

Senior Cybersecurity Researcher

FEV India Pvt Ltd
05.2023 - 03.2025

Automotive and IOT Cybersecurity Engineer

Amynasec Research lab.pvt
09.2019 - 01.2023

Associate Router Firmware Developer

XUNISON LTD.
02.2018 - 09.2019

Intermediate - undefined

G.S.H.S.E.B

SSC - undefined

G.S.H.S.E.B

Bachelor of Engineering - ECE

G.T.U
Amir Saiyad