Information Security Officer
Al Etihad Credit Bureau
Total years of experience :11 years, 11 Months
Ensure security measures are followed within the company to make sure confidentiality, integrity, and availability of IT systems was
maintained.
Manage and improve information security documentation as required
Work with other operational teams to resolve incidents and report on events
Provide support during and lead security event investigations when required
Understanding of electronic security event management, investigation, and methodologies. Including: log correlation and analysis,
knowledge of the computer security investigative processes
Research and test new security tools/products and make recommendations.
Provide real-time guidance on network configuration, security settings and policies, and attack mitigation procedures.
Ensure that vulnerabilities and threats detected are remediated.
Recommends security controls based on threats detected and vulnerabilities discovered to better protect Company data, confidentiality
and business continuity.
Ensure audit trails, system logs and other monitoring data sources are reviewed periodically and comply with policies and audit
requirements.
Consult with IT to ensure that security is factored into the evaluation, selection, installation and configuration of hardware,
applications and software.
Recommend and coordinate the implementation of technical controls to support and enforce defined security policies.
• First line malware analysis incident responder.
• Monitoring & Implementing SIEM solution
• Examines malicious software, such as bots, worms, and Trojans to understand the nature of their threat and prepare report
• Analyze security products in industries such as Antivirus or Network Intrusion Prevention to develop ways of blocking malicious code
• Perform Vulnerability Assessment & Management.
• Validate implementation of controls to protect C.I.A
• Provide & document patch updates for software
Review, implement and monitor security policies, procedures, standards and guidelines
Designed a more efficient reporting system to facilitate identification of threats to financial, operational and IT risks to sensitive customer and corporate information, enabling prompter action as issues are identified.
Review, implement and monitor security policies, procedures, standards and guidelines stored.
Implemented a comprehensive set of network monitoring applications that provided early warning of information system issues that minimized downtime and increased performance for business partners.
Analyzed, recommended, and coordinated the installation of security software, hardware.
Provided thorough support and problem resolution for customers environment
Supported customers having data connectivity issues.
Informed customers about issue resolution progress.
Researched issues on various computer systems and databases to resolve complaints and answer inquiries.
Trained new employees and explained protocols clearly and efficiently.
Built and maintained successful relationships with service providers, dealers and consumers.
Resolved customer complaints and concerns with strong verbal and negotiation skills.
Provided base level IT support to company personnel
Prepared the overall security plan and managed the security operations of the organization, including assignments and staffing.
Monitored the performance of the security units installed in the firm and reported the shortcomings to the clients
Researched market constantly to gain knowledge of the latest trends in security system implementation and possible security threat
Recommended installations of new/ latest security systems or a possible up-gradation in the existing systems.
Maintained and conducted a routine checkup of several sites in the firm and analyzed shortcomings present in it
Studying MS-IT on Scholarship program of year 2014.
Honor For Event organizing for the year 2012