As a Global IoT Specialist and Lead Security Architect at AWS, Syed is a true leader with 15+ years of experience in his field. He is one of the founding members of the AWS IoT organization in the EMEA region, he has played a pivotal role in driving the growth and success of the organization.
With his deep technical knowledge and expertise, Syed provides valuable insights and feedback to help develop the best IoT-focused products. He is not just a thought leader but also an active participant in IoT and ML projects and is highly respected in the open-source community. Syed collaborates with other AWS teams around the world to share best practices and build a world-class organization that is dedicated to delivering the best cloud products.
Syed’s influence extends beyond AWS as well. He is a highly sought-after speaker and author in the industry, having written 3 of the top 10 official AWS workshops and regularly presenting at top tier events such as AWS re:Invent and AWS summits. With his engaging presentations, product demos, and discussions, Syed promotes the adoption of AWS technologies and addresses the critical cybersecurity threats faced by the cloud and IoT.
You can also learn more about Syed on LinkedIn.
Here’s a quick summary of key takeaways:
- Pursuing a career in ethical hacking and participating in ethical hacking challenges
- Importance of showing competency and taking proactive actions
- Discussion of AWS services in cybersecurity, including databases, API gateway, serverless lambdas, and edge services for IoT
- Overview of different cybersecurity categories, including Zero Trust, Siem, XDR, and Sora
- Advice on learning a single category first before branching out
- Availability of free courses and workshops for beginners, including speaker’s own workshop on Zero Trust
- Explanation of workshop’s purpose and guidance on implementing cybersecurity with a Zero Trust approach
- Emphasis on taking a vertical approach and gradually building knowledge in cybersecurity
- Importance of machine learning and AI in today’s world and AWS’s offering of IoT Device Defender ML Detect
Listen to the podcast here, or find if wherever you get your podcasts:
Ryan Atkinson: Welcome everyone to the Tech Guide podcast, where we give actual advice to those wanting to break into tech or looking for their next gig.
We have side Rahan on the podcast. Welcome side. Super excited to have you on today.
Syed Rehan: Thank you, Ryan. And I’m glad to be here. It’s super fun to speak to a young upcoming tech individuals like yourself and to the crowd who’s probably listening to this podcast. And I’m looking forward to all the questions and sharing my wisdom and my journey.
How you basically can get started and you can pivot if you want to pivot.
Ryan Atkinson: Yes, and you’re going to be the perfect person to do that because you are a well known author, speaker, you’ve written AWS workshops, you’ve been to that AWS events, and you’re a founder, founding member of the AOS IO team organization in the European region.
That is so, so sick, but I want to go back to your early life. Let’s rewind a little bit. Can you take us to your early life and tell us a little bit more of like, where did this love for like technology come from? Cause you’ve been on it your whole life. So I’m curious, early stages.
Syed Rehan: This is a very interesting story.
I think partially. I kind of blame my father, but in a way it’s a blessing as well. So I actually, apply to become a doctor, right? Medical doctor. So I remember my father bought a X86, Windows 3. 1 machine, right? And he bought it from his friend and he said to me, Hey, we got this computer. See if you can fix it.
Right. And I always, Had this curiosity that I like to work backwards, break things and put it together. [00:02:00] So obviously it was hardware. It’s not something which I’ve experienced before. We had RAM, we had hardware. I looked at it and I was like, okay, why are we stuck? On a blue screen of death, windows 3.
1, right? It never had actually blue screen of death But it was you had to type in some commands to obviously get going if it crashed so I played with it and I I tried so many help options. I fiddled with a lot of commands I get it going and then my father took it back to his friend and he said actually he’s given you another one Right and then this time he’s got windows 95 And I was like, very nice.
Okay. So that basically got me started. I got curious that Windows 95 the first thing I did, right. I actually, uh, there was a magazine called Linux Format Magazine in UK, right? So I went to the shop and I bought the magazine because they used to come with floppy disk way back. And they had like four floppy disks.
Floppy disk running Red Hat 6. 0, I think, 6. 0. Um, so I said, you know what? I’ve seen these windows, all they have is Solitaire, Minesweeper, I’m proud of it. So I installed Red Hat in it. So that was actually a challenge on its own, because obviously, you had to put next disk, you have to format it, you have to use partition, you have to make sure the master bootloader is correct and everything like that.
So that got me started on a journey. So I actually went through a rabbit hole, writing Python script, right? Sorry, not Python, Bash script to make sure the bootloader opens correctly. So I basically started it. I set a day up, then there was, I had to set up X, there was at at those days, right?
Having an internet data was commodity. Right. And if you remember among us who are actually from my era, we’ll remember that you have to set up a modem which will connect and it will make noise. And then once that’s connected you do not get phone call. Right. So, yeah, my dad never used to get phone call and he was very angry that why the call is not coming then he [00:04:00] realized I’m actually consuming data.
It was one of those days where one MB literally could take me, in fact, easily be talking about half an hour to 45 minutes. Right. And, you know, so I get to a point where I was like, okay, fine. I’m not going to use the Internet. Because it’s very expensive and we had those days where AOL used to give free CDs to say, okay, use our system, but that system never actually had the computer I’m talking about never actually had a CD.
It used USBs. So I got really irritated. I started reading man pages. So people who among us who use Linux or Unix, there’s something called manual pages, but the command to get into is man pages. So I read those man pages. I got started. I installed. C plus plus compiler, glue compiler, and let’s put it this way, I said to my father, I can’t basically be a doctor because I think I enjoy this and I’m gonna do this.
So mother, my father said to me, look, I know from the era my father came from, and he told me that. There is no respect for people who are you talking about? You’re gonna be basically, Trying to basically make earning without knowing that what the world is out There is gonna be like and you should be a doctor because human body always needs people to look after their body So I said look So I have to make something.
I said, look, I can’t take blood. Right. And he said, look, we have everybody highly educated in our family. And you were the first one. We were hoping that you would go from my sons will become a doctor. And I said, let me give it a shot. Okay. If I basically don’t get anywhere with it. So I’ll basically give up and I’ll basically become a doctor.
Right. So he gave me a time and he said, okay, I’m going to give you six months. Go ahead and show me what you could do. So I was actually still in college at that time. So college, I don’t know what the equivalent of that in us. But it was a college time. So I was nearly about 16 and a half. And I basically went for a company which they were asking for technical developer.
They were actually looking for [00:06:00] a C developer. I said, well done, I can do C , and I was actually had a piles of book for C. So I started doing programming for those guys and then they never used to pay me. It was a kind of intern job. So I went to my dad and said, look, they don’t pay me, but there’s a prospect out there.
So my dad said to me, okay, fine. If you’re telling me there’s a prospect out there. And you think you can make it without basically making me feel ashamed that you’re not going to be a doctor then Let’s see what happens. , Long story short from there. I basically progressed to become a full stack developer for those guys.
I wrote that company’s website and my dad was like, okay now they’re paying you I said, yes, they’re paying me and then he said, okay fine Pursue whatever you want because obviously that’s your future your life But I want the best for you if you think that Giving up medical field because you actually have an option of going to do medicine.
You won’t be able to do that afterwards because you’re going to get busy with your life. So long story short, I pivoted in the early stage of my life with my father. And yeah, here we are.
Ryan Atkinson: I think that’s so cool. I feel like yes, you had this external pressure to like be a doctor, be a doctor, be a doctor, just like pounding down on you but you really felt like followed your heart into doing something that you love doing.
It was basically like coding. Yeah, exactly. And I wanna talk about that as well. Yeah. ’cause like your early career you had a few different roles of like being a software engineer, solution architect being like solution designer. But then recently, or not, so recently, you basically made the move into cybersecurity.
Which is like a super hot field. Everyone wants to be in cyber security right now. There are so many reasons to be in cyber security yeah. Can you take us like through that progression of yeah, I had all these different roles, but I. Now I’m landed out of this cybersecurity. Can you take us through that journey a little bit?
Syed Rehan: Actually when I basically became a C plus plus engineer, we talking about way back in 2005, 2005 year, I was working for a company called WEMS limited, [00:08:00] excuse me, and at the same time I was actually doing my degree in university. , I remember those was the days when networking, well, computers were using Windows NT and I try, I’m going to try to basically be as conservative as I can because I don’t want to basically give away the fact that, there were things okay, let’s put it this way.
I’ll try to be open as much as I can. I actually was I became an ethical hacker. Okay. And how I became an ethical hacker is because when I started doing C programming, right? They told me that, Hey, go ahead, install LAMP stack L A M P, which is Linux, Apache, MySQL, PHP way back. We’re talking about 2005.
I don’t know whether people still use LAMP or not. So, um, basically he turned around at my, my, I was basically doing a, One year internship while I was in the university. So it went, it went two ways. I went to the, I went to the company, I was basically doing the job there. It was literally, they were paying me for my travels.
Um, and I realized that when I was coding actually in C I was actually writing firmware. For microcontrollers, these cameras, which are used by soccer players in their houses security systems, all of this was written in C So I wrote it. Then I realized that all this data I’m basically creating, I created the server for them.
I wrote the server. I’ve set it up, everything, the whole complete stack. And once I basically set up the C environment, I realized that. The system can actually crash if you do not do correct memory allocation, because obviously in C it’s better, but in C it’s worse, right? You gotta do memory allocation and deallocation and whatnot.
So, part of the firmware C, and part of it was written in C So the C firmware, actually when I was testing it, crashed. That got my curiosity piqued. I basically start testing it. I wrote a program to see that, [00:10:00] okay, how can we identify the memory allocation and how can we identify the memory location? So when I started reading the memory location, actually I was reading some sensitive system data.
So I realized that, okay, this is not good. So I informed, because at that time we’re talking about 2005 where all of these development stack were actually writing unencrypted. On the volatile memory, when we’re talking about volatile memory as computer memory RAM, right? And then I got hold of the data and I said to him, this is not good.
We can’t hold up the data. So I said to the director and the director was like, okay, you go ahead and fix that. We’re going to pay you for it to fix it. That’s where I got the taster of understanding how to break things in an ethical way. While at the same time, while I was in university, my manager actually sent me an email, my, my professor actually sent me an email because I was studying and working together.
So my professor said to me, Hey, this is the email everybody deliver us. Right. But I was actually using Linux and I was using text based email reader and in those email reader we had a metadata. So I looked at the metadata and that was actually disclosing, the key which was signing the authentication for the professor.
So Cool. I said to the professor, look, and I went to his, by the way, when I did this, I did ethically, I went to him and said, look, I’ve got a Linux machine here. I don’t know what computer you’re using. I think he was using Novel or something at that time. And I said, look, I’ve got this Linux machine here.
I’ve got your metadata here. And I can basically emulate and log in as you, right? I can read your messages, I can read and, and he was like, Oh, this is amazing. This is outstanding. You found a security loophole. So he mod, he obviously informed the email server, IT staff and IT support. So this is where I actually realized, hold on a minute.
There are more to it than just a standalone [00:12:00] machines. So I started on the journey as an ethical hacker. And I, I did talk part in a few challenges where we do hacking sessions ethically. So yeah, that’s where we started from.
Ryan Atkinson: Interesting. And I kind of want to talk a little bit more pivot to a little bit of like cyber security and people that do it like on unethically because cybersecurity is obviously trillion dollar industry.
I mean, can you put a number on to really hone in the importance of cyber security for a company like AWS or even like any of these huge like how important it really is in some sort of quantifiable way?
Syed Rehan: So let’s put it this way. , the CTO of Amazon clearly says that, dance like nobody’s watching.
Right. And secure like everybody’s watching. So if I were to basically put it, I can’t say better than that, and From AWS perspective, security is absolutely prime, it’s job zero, right? We will actually drop everything if it basically has any security issues, everything. So it’s a, from AWS perspective, it’s absolutely critical to have job zero when it comes to security.
Ryan Atkinson: And I’m curious, , when people are, like, doing, these data breaches, or, , trying to do, , some sort of, data attacks, or, , cyber attacks, what do they look for like when they are trying to do like a cyber security attack?
Because you always hear about like hospitals, like some of these huge companies oh, we were, I guess, had a cyber security attack, but like, what are these like hackers like really like target when they did that just out of curiosity?
Syed Rehan: So there’s a lot of, um. Malicious characters or should I should say I I mean we refer to as malicious actors These are the people who are basically doing this for one or two reasons.
The first reason is always financial reason and second reason is basically they just want to basically show the company That they’re smarter than you and their security is not safe enough. Right. ? I mean, [00:14:00] uh, when I was basically working for, this reminds me of a story when I was working for Nokia way back in 2008.
And at that time I remember in Nokia they actually, we, I was actually writing a H 2 6 4 hardware Kodak as a mobile lead in Finland. And. One of the key things they basically said, okay, we’re writing a Kodak. We need to make sure it’s not reversible, right? And we also need to make sure we can basically set it up as IP.
So other companies who are going to take it or inherit it, basically going to charge us or pay us so we can charge them. Now at that time, obviously the internet wasn’t that fast, but internet was there. Um, we had to make sure that people who are actually, in fact, even. working locally within the country are able to do something called bastion jump and bastion jump is like you basically connect to a interim server and then from interim server you jump into another server.
This is where you’re hosting your uh, IP or privileged code and we always often I used to hear it. from the company a lot is that there has been a lot of port scanning, a lot of DDoS attacks to basically bring this server down so they can bypass and get to the main server, which is holding the code.
Um, again, this is the job of a security engineer, which I was involved at that time as well to make sure we keep these bad actors out.
Ryan Atkinson: Yeah. And I’m, I’m like curious, like. How do you keep the bad actors out? Is it all through like code or what, what are some of the ways that like someone in a cybersecurity role, no matter the company that they’re at, they’re trying to keep all these bad people out.
Is it all through like code or like what are some of the best practices that
Syed Rehan: like people? Yeah. So that’s a good question. That’s a very good question. So from, I mean, if we talk about now, right, we have something called machine learning. We have something called AI. There are facilities and [00:16:00] tools and features out there.
Let’s for example, if I take for example of AWS, AWS has, I won’t say the numbers, but millions of devices connected to the cloud, right? And all of these, millions and billions and trillions of devices, I’m not trying to give a number. I’m just trying to make sure it’s. A vivid’s. Okay. So this,, the amount the devices which are connected to a W ss we actually provide something called a W S iot Device Defender ML detect.
Now what ML detect does, it actually creates a machine learning model from the point you actually enable the machine learning profile. For your account, which means every device which is connecting to AWS IOT will have the capability to understand the anomaly, right, which is happening on the device, which means, yeah, so which means if there’s any issue on the device.
As a human, you might not be able to detect it immediately, but the machine learning will. And that’s where I think, now these days, where we actually are in a world of time where machine learning is so involved and so important, you need to basically use the power of machine learning to enable the security for your devices.
And this is where it can take, remedy, remediate action. Without a human intervention. Excuse me.
Ryan Atkinson: That is incredible. I’ve never even like really thought of what, yeah, let’s talk about the future of that then, like machine learning being used in cyber security. I mean, can you talk a little bit more about like where you think the future of like machine learning will be incorporated with cyber security.
Syed Rehan: Yeah, so it is actually a cool topic, but it is a so in depth topic. I’m going to struggle to go deeper than obviously the time we have, but to give a to give you an overview, I will say, to give you an overview, I will say amount of data humans and [00:18:00] devices are actually creating, right?
Where there’s a connectivity data without a flow of data or information, what we’re trying to consume on our devices, on our mobile phones, on our routers or anything, which is connected, right? All of this data. Firstly, needs to be secured end to end with the cloud, right? Now the encryption happens using a TLS protocol, for example, right?
Authentication needs to be done with a private key or some form of authentication. You can use that on the TPM, on the hardware side, or basically you can use PKI to have a non TPM based or have a software based TPM. This is where your end credentials are secured. Once the connection is done, but that’s the start of the journey.
Yeah, the data which you have you can take the data from cloud perspective and create a machine learning model This is where I was referring to AWS IoT device defender ml detect what it actually does It creates a machine learning model for you and actually notifies you That for example if the device has become chatty, which could mean somebody has tried to breach the device Or, the device has been irresponsive, it’s not been responding anymore.
That means that somebody has basically breached the device and it’s not been connecting anymore. Or it could be the fact that somebody’s actually got hold of the device. So you have all of these parameters, right? They are, there’s a lot of parameters which machine learning ML detect will take. And it will basically take the data and say, okay, I remember based on the historic data, the pattern was, let’s say, just like this, right?
It was straight linear line. Now, I have noticed from last two hours, three hours, four hours, the pattern is very spiky. Because somebody is sending a lot of irregular data. It could be the fact that somebody tried to go hold off your phone or router or whatever connected device, right? And they’re trying to breach through the system.
And this is where, if a human was sitting there, he would be like, okay, I can see in same amount of data is coming, same amount of data is going. But the [00:20:00] machine learning will identify the anomaly. So we call it anomaly. Because let’s say if the normal pattern of Ryan connecting, coming in, turning his light off because it’s connected to the cloud, his IOT device, or he’s using his smart TV connecting and using, I don’t know, Netflix or Amazon prime video, whatever, because you have a normal humans have regular pattern.
However, if somebody is basically trying to hold off your smart home devices, right. And trying to breach in, they’re going to show irregular pattern. And this can be detected by machine learning. And that’s what I mean by machine learning will basically detect this well before we actually can analyze that this actually has happened because what will happen, the machine will take this, it will detect it and it will basically push it out and show you the notification that this actually has happened and you can basically take the remedial action, i.
e. you could take the device and isolate from all of your network and remedify to figure out whether it’s actually a software issue or somebody else got hold of the device and whatnot. I have had situation in the past where customer came to me and said, okay, one of the devices basically behaving very irregularly.
And I can see that this basically sending the data. What has happened? So I work with the customer deeply. We basically investigated it and it turned out that somebody basically got hold off their firmware because their engineer basically made a mistake of disclosing some of the information on Stack Overflow or GitHub.
And this basically got leaked out and they basically use that little snippet. Right a little snippet to breach their firmware and try to go hold of other devices which is connected to their firmware For example, if they have a smart home hub Which has a light bulb connected a door lock connected and they try to breach the smart hub to make sure they can control it But, a machine learning AWS IoT device defender, ML detect, was able to identify the anomaly [00:22:00] showing that this device has become chatty and is responsive in a very irregular manner.
And that’s where they got notified and they took a remediate action by isolating the device, remediating the device by uploading the firmware, reversing it, making any action which was happened, uploading the source code, uploading the firmware all across the devices and it was secured. That is
Ryan Atkinson: I think it’s so cool that , the machine learning can just, like you said, isolated to , and then basically cut it off and remedy it. That is so sweet. And I want to talk a little bit as we kind of wind down here to like career advice. So someone’s listening to this. They’re like, Oh my God, like that is the coolest thing I wanted.
That is so cool. I want to get into cybersecurity. I want to get like machine learning. , can you talk to us about like different ways that you can get into cybersecurity? It sounds like you took a traditional route, like software engineering. Yeah. Yeah. But can you tell us a little bit more about a nontraditional way that someone could get into cybersecurity?
Syed Rehan: I love Amazon leadership principles, and I’m going to take a leap from the leadership principles. And Amazon leadership principle says that, learn and be curious. Right. And if you basically are always going to be learning, be curious, you’re going to make your way regardless, right?
Whether it is a startup, whether it’s a, a large enterprise, whoever it is, you need to be learning, be curious. You need to basically work backwards and you need to make sure you invent and simplify. For example, if there’s a problem in front of you and you think that, okay, I’m basically, I don’t know engineer or I’m somebody else, who’s not in the right field, if you show competency, then you can basically convince anybody to make sure that they can give you a job or breakthrough.
So my key gateway is that giveaway is learn and be curious.
Ryan Atkinson: Learn and be curious. I like it. And what resources would you give to someone? Would it be like doing like an AWS workshops? Learn more about cyber security or like where if someone’s saying they’re like, okay, like I can do that.
But like, where, like, where should I start at? Like, where would you direct them to? Yeah.
Syed Rehan: So that’s a great question, [00:24:00] right? Because we are living in an age of information. There’s like tons of information out there. If you. If you are basically starting, there’s plenty of courses which are free and there’s plenty of workshops.
So, I mean, for example, if you want to learn more about Zero Trust, you can go to a website of which I’ve authored is called awsiotzerotrustworkshop. com. Right. That workshop will basically guide you through the leadership, sorry, Zero Trust principles and how you basically can learn about the Zero Trust principles.
I have a lot of customers who come and say, okay, I know what Zero Trust is, but how can I implement it? So you can basically take that and implement it and learn it, that how does Zero Trust works. Because we basically designed this workshop from a NIST principle. NIST is a cyber security organization in the United States.
And we took the NIST principles and implemented this workshop using Zero Trust and their principles to guide, um, somebody who doesn’t have any hands on knowledge for cyber security, but learn the Zero Trust way. How you basically can implement cyber security. Cyber security is a very vast field. You need to basically take a vertical, work on that, then build and broaden your knowledge base.
Ryan Atkinson: Interesting. Can you talk a little bit more about, about that? What do you mean by the vertical? Do you mean like an industry or what do you mean by
Syed Rehan: that? So what I mean is that, you know, for example, we have zero trust, right? We also have something called SIEM, which is security from even management systems that we also have something like SD XDR.
We also have something called SOAR. All of these are different verticals or areas. I should say, maybe you’re right, I should say areas within cyber security, because all of these are different categories of cyber security where you’re actually targeting. So what I would basically, if I were to reword the phrase, I would say, learn a single category first.
Get a complete understanding on the category and then build on the foundational knowledge of others. So, for example, if you start [00:26:00] with the workshop, you will basically understand Zero Trust, right? How does Zero Trust principles work? How you basically can mitigate actions on using AWS IoT services and whatnot.
The key point to remember here is that the Zero Trust principle doesn’t change regardless of which service or cloud provider you use. The only thing what you need to keep in mind is that Zero Trust is essentially… basically not trusting anybody connecting to your environment. But you learn that, how it’s basically done hands on in this workshop.
And once you basically use that, you learn the capability of what Zero Trust is. Then you need to explore what SIEM is. And then you need to look at what SOAR is, S O A R is, right? Then you need to look at XDR. All of these are different categories within cybersecurity, targeting different areas. So Zero Trust basically will target When the device are connecting, authenticating, authorization is occurring, connecting to the cloud or your environment.
SIEM is basically when the device is connected and how it’s basically behaving, how it’s basically sending the information, what events are occurring when the device is connecting and what not. Similarly with SOAR and similar with XDR. So I won’t go into that because of interest of time. But what I will say is that learn from Zero Trust because that’s where authentication authorization occurs.
Then build up your knowledge set.
Ryan Atkinson: Ah, that’s amazing. Yes. I really love that. Cause like, yeah, like you said, there’s a lot of different ways to get started and it’s going deep before you, before you go abroad because it is, like you said, it is such a fast evolving field right now.
Syed Rehan: Absolutely. Yeah, absolutely.
Ryan Atkinson: And yeah, so let’s just say someone does this. They, they focus on zero trust. They break in with a company like Amazon and they’re working under you. They’re super excited to be there. They’re really young in their career. , what are some of the ways that someone who is young in their career can stand out and like in a cybersecurity role?
I think,
Syed Rehan: I always believe that action speaks louder than words, right? Because if you can basically show your competency, your capability, then you will go far. [00:28:00] I mean, with AWS, one of the, one of the beauty about AWS is that, there is no bureaucracy. You basically show what you’re capable of, and then obviously you will proceed ahead.
And being AWS or Amazon is such a vast company, you could actually move. from one organization to another based on your interest, but if you’re basically staying within cybersecurity, there are many areas within cybersecurity of different services. I mean, we have services which are databases, which you can connect to database.
We have, something called API gateway. This is where you connect your gate, your functions, external API endpoints calls into the system. We have so many services. We have serverless lambdas, right? AWS lambda. You also have. H services for AWS IoT like AWS IoT Greengrass, right? All of these services, there are so many, but the key Aspect stays the same every single one of them require security every single one of them So this is where your interest in cyber security comes into effect where you say You know what?
I’m interested in securing databases, connecting databases. When the customer is trying to connect to database, you can focus on that. If you say to yourself, you know what? I basically have more interest rather than databases. I have more interest, let’s say, machine learning services, because obviously they need to, have the data coming in and out to build the model for machine learning.
You can focus on that to make sure how can you secure these environment because the data is the new oil right data is very critical And this is where you say to yourself that I can shine by showing my competency If you have a competency Your actions will speak louder than your word. You need to basically show what you have identified, what you think could be the issues, if this thing basically is causing any issues for the customer, maybe, right?
For example, let’s say, you know, if you say, Oh, I basically think we can improve this feature. Go ahead, write a one pager, you can write a pager and send it to your manager. They will look at it and say, yeah, okay, go ahead, build it short.
Ryan Atkinson: I love that and we will end with that. So [00:30:00] you were amazing.
I really enjoyed this conversation. It was really fun talking about the machine learning and cyber security and a ton of great tips here at the end on how to actually break into it. So thank you so, so much for being here today. This was an awesome episode.
Syed Rehan: Thank you. Thank you for having me. And I hope that, people who are out there.
Get this motivation to join the industry. And always, as always, I’m happy for people to connect to me on LinkedIn. Ask me any questions on LinkedIn or Twitter. I always try to make sure I help people whenever they ask me a question.
Ryan Atkinson: Perfect. You are the man. Thank you
Syed Rehan: Have a great day.