Ahmad Atif, Penetration testing manager

Ahmad Atif

Penetration testing manager

Kuwait International Bank

Location
Kuwait - Al Kuwait
Education
Bachelor's degree, Management Information Systems
Experience
16 years, 1 Months

Share My Profile

Block User


Work Experience

Total years of experience :16 years, 1 Months

Penetration testing manager at Kuwait International Bank
  • Kuwait - Al Kuwait
  • My current job since September 2021
Senior penetration tester and red team at Kuwait Finance House
  • Kuwait - Al Kuwait
  • October 2019 to September 2021

Senior penetration testing consultant - temporary contract

information security engineer - Penetration Tester at Qatar Airways
  • Qatar - Doha
  • August 2016 to August 2019

Perform application and infrastructure penetration tests, as well as physical security review and social engineering tests for our global clients.
Attempt to “break into” the specified network.
Review and define requirements for information security solutions.
Perform security reviews of application designs, source code and deployments as required, covering all types of applications (web application, web services, mobile applications, thick client applications, SaaS).
Participate in Security Assessments of networks, systems and applications.
Work on improvements for provided security services, including the continuous enhancement of existing methodology material and supporting assets.
Document malware threats and identify procedures to avoid them.
Analyze programs and software using analysis programs to identify threats.
Classify malware based on threats and commonalities.
Keep up-to-date on the latest malware threats and keep software updated to defend against them.
Help create documentation for corporate security policies.
Understand tools that identify zero day cyber threats and work to protect from them.
Participate in research and development of malware protection tools.

information security engineer at nile academy for engineering
  • Egypt - Damietta
  • May 2014 to August 2016

Engineer, implement and monitor security measures for the protection of computer systems, networks and information.
Identify web application vulnerabilities
Identify and define system security requirements.
Design computer security architecture and develop detailed cyber security designs.
Prepare and document standard operating procedures and protocols. 3
Configure and troubleshoot security infrastructure devices.
Develop technical solutions and new security tools to help mitigate security vulnerabilities and automate repeatable tasks.
Ensure that the company knows as much as possible, as quickly as possible about security incidents.
Write comprehensive reports including assessment-based findings, outcomes and propositions for further system security enhancement

Network engineer at ELadl Company
  • Egypt
  • January 2010 to February 2014

Engineer, implement and monitor security measures for the protection of computer systems, networks and information.
Identify web application vulnerabilities
Identify and define system security requirements.
Design computer security architecture and develop detailed cyber security designs.
Prepare and document standard operating procedures and protocols. 3
Configure and troubleshoot security infrastructure devices.
Develop technical solutions and new security tools to help mitigate security vulnerabilities and automate repeatable tasks.
Ensure that the company knows as much as possible, as quickly as possible about security incidents.
Write comprehensive reports including assessment-based findings, outcomes and propositions for further system security enhancement

Network engineer at International Center for Marketing
  • Egypt
  • December 2007 to October 2009

Establishes networking environment by designing system configuration; directing system installation; defining, documenting, and enforcing system standards.

Maximizes network performance by monitoring performance; troubleshooting network problems and outages; scheduling upgrades; collaborating with network architects on network optimization.

Secures network system by establishing and enforcing policies; defining and monitoring access.

Updates job knowledge by participating in educational opportunities; reading professional publications; maintaining personal networks; participating in professional organizations.

Accomplishes information systems and organization mission by completing related results as needed.

Reporting network operational status by gathering, prioritizing information; managing projects.

Education

Bachelor's degree, Management Information Systems
  • at Egypt Academy
  • June 2009

A management information system (MIS) focuses on the management of information systems to provide efficiency and effectiveness of strategic decision making. The concept may include systems termed transaction processing system, decision support system, expert system, or executive information system. The term is often used in the academic study of businesses and has connections with other areas, such as information systems, information technology, informatics, e-commerce and computer science; as a result, the term is used interchangeably with some of these areas.

Specialties & Skills

Security Information
Web Application Security
Network Security
Information Security Management
Penetration Testing
technical support for php websites and linux servers
management of websites
security of the php website
php programmer
web penetration testing
Cross-site scripting Exploit
Network penetration testing
HardWare
vulnerability assessment
Website Security
information security
penetration testing

Social Profiles

Personal Website
Personal Website

URL removed due to policy violation. Please contact support for further information.

Languages

English
Expert
Arabic
Native Speaker

Memberships

OMAN Computer Emergency Readiness Team
  • OMAN Computer Emergency Readiness Team
  • November 2013
ISSA - Information Systems Security Association
  • ISSA - Information Systems Security Association
  • January 2016
ISACA
  • professional membership
  • June 2016

Training and Certifications

Certified Red Team Expert (Training)
Training Institute:
Pentester Academy
Date Attended:
July 2020
Offensive Security Certified Professional (OSCP) (Certificate)
Date Attended:
January 2020
Offensive Security Certified Professional - oscp (Certificate)
Date Attended:
January 2020
Advanced Incident Response & Threat Hunting (Training)
Training Institute:
SANS
Date Attended:
August 2017
Duration:
36 hours
Malware Analysis and Memory Forensics (Training)
Training Institute:
Black Hat Asia 2017
Date Attended:
March 2016
Brocade Certified vRouter Engineer 2013 (Certificate)
CWNA - Certified Wireless Network Administrator (Certificate)
LINUX REDHAT Essentials (Training)
Training Institute:
Outbox Training
Date Attended:
July 2010
Cisco Certified Network Associate (CCNA) (Certificate)
GIAC Penetration Tester (GPEN) - Sans (Certificate)
Brocade Certified vRouter Engineer 2013 (Certificate)
ITIL Foundation Certificate (Certificate)
VMware Certified Professional - Network Virtualization (Certificate)
Date Attended:
April 2015
Valid Until:
April 2017
Php Web DeveLopment (Training)
Training Institute:
Outbox Training
Date Attended:
May 2010
CCNA Security (Certificate)
CEH v 7 (Training)
Training Institute:
Outbox Training
Date Attended:
January 2011
IBM Security QRadar V7.0 MR4 Fundamentals (Certificate)
Brocade Certified vRouter Engineer 2013 (Certificate)

Hobbies

  • traveler
  • MMA
    Mixed martial arts
  • swimming