ALI JASSIM AL-BASRI, Cyber Security Manager

ALI JASSIM AL-BASRI

Cyber Security Manager

Confidential

Location
Saudi Arabia - Dammam
Education
Bachelor's degree, Information Technology
Experience
16 years, 11 Months

Share My Profile

Block User


Work Experience

Total years of experience :16 years, 11 Months

Cyber Security Manager at Confidential
  • Saudi Arabia - Khobar
  • My current job since September 2021

-Develop and implement the company's cybersecurity strategy that aligns with business objectives.
-Developed and implemented security frameworks based on NAC-ECC, NIST, ISO, SAMA, and SACS-002.
-Manage the cybersecurity team and collaborate with cross-functional departments to ensure compliance with security policies and procedures.
-Conduct security assessments and risk assessments to identify potential vulnerabilities and develop strategies to mitigate risks.
-Implement and manage security tools such as SIEM, IDS/IPS, and vulnerability scanners.
-Develop and deliver cybersecurity training and awareness programs to employees to promote a security culture.
-Manage incident response activities and work with the team to identify and respond to security incidents.
-Maintain an up-to-date understanding of the threat landscape and emerging cybersecurity trends.
-Expert experience in designing and implementing security solutions

Information Security Engineer at SSBS
  • Saudi Arabia - Dammam
  • June 2013 to August 2021

• Align overall organizational operational goals with security functions and implementations.
• Protect assets of the organization as they go through their lifecycle.
• Identify standard terms for applying physical and logical access controls to environments related to security practice.
• Appraise various access control models to meet business security requirements.
• Enhance and optimize an organization’s operational function and capacity by applying and utilizing appropriate security controls and countermeasures.
• Recognize risks to an organization’s operational endeavors, and assess specific threats, vulnerabilities, and controls.
• Ensuring the confidentiality, integrity, and availability (CIA) of assets
• Symantec Email Security/Endpoint protection Could.
• Endpoint Threat Analysis, Computer Forensics, Network Intrusion Analysis.
• Incident Response & Incident Handling, Data and Event Analysis.
• Excellent Security & Network Concepts.
• Cryptography, Host Based Analysis, Security Monitoring, Attack Methods.
• Penetration testing Perform Vulnerability assessment.
• Configuring Fortinet Firewall, Fort iCloud Sandbox.
• Configuring & manage antivirus console management (Kaspersky endpoint + FortiClient endpoint).
• Secure Routers & Switching (DHCP snooping, port security, arp inspection).
• Configuring AlienVault USM (SIEM, Asset management, Vulnerability assessment).
• Good knowledge of networking and IT Security principles, techniques and methodologies.
• Monitoring/response Microsoft Advanced Threat Analytics.
• Strong communication, negotiation and problem-solving skills.
• Design, implement and manage security tools and systems such as IDS, IPS, VPN, DLP, firewalls.
• Implement technologies and processes to increase security, simplicity, cost-effectiveness, recoverability, and overall effectiveness of the network, servers, and Supporting systems.
• Enhance the security stance of internal infrastructure and client-facing systems.
• Experience analyzing, troubleshooting, and investigating information security incidents from a variety of reporting platforms: Alien Vault USM vulnerability Monitoring systems.
• Protects system by defining access privileges, control structures, and resources.

IT Technical support at axiom telecom
  • Saudi Arabia - Khobar
  • November 2009 to May 2013

IT Technical Support Axiom Telecom (Head Office) Al-Khober, KSA

• Configer Router Cisco, Switches, route static, rip, eigrp, igrp, ospf, STP config, VLANS Manage, Truank Mange, good in IOS,
WAN Config HDLC, PPP, SLIP, IP subntting, network topology manage, Routed Protocols IP, IPX, Apple, Wireless Manage 802.11a, 802.11b, 802.11g, 802.11n, Config Repeater, NAT Static, Dynamic, Overload, IPV6, Access Control LIst
• Monitoring and maintaining computer systems and networks
• Providing technical support and troubleshooting to customers for a software or hardware product.
• Installing and configuring computer systems & printers, diagnosing hardware/software faults and solving technical and applications problems, either over the phone or in person.
• Supporting end-users on MS Office, Outlook, Citrix and others.
• Setting up new users’ accounts and profiles and dealing with password issues in the AD.
• Responding within agreed time limits to call-outs.
• Talking staff/clients through a series of actions, either face to face or over the telephone.
• Troubleshooting system and network problems, diagnosing and solving hardware/software faults.
• Working in Linux environment.
• Performing data imaging, software backup and restore including an automatic AD backups.
• Using SQL Language ( SQL Server)
• Providing daily reports including statistical data about requests & problems solved.
• Accomplishing tasks & responsibilities with TPS (Toyota Production System) quality measurement.
• Manage windows server 2003, work with domain, backup domain, work with active directory, rest password using active directory, backup active directory,

Administrator Network & Programmer at Sirti Saudi Arabia
  • Saudi Arabia - Khobar
  • March 2007 to August 2009

Maintains existing applications
Creating code that meets system standards
Developing new application from beginning to end including Web-based applications (VB, SQL Server, .Net, C#, Ajax Technology and other languages).
Creating reports using Crystal Reports.
Planning using Primavera Project Management.
Managing, troubleshooting and administering network issues.
Working in SAP system (IDs) and documents controller.

Education

Bachelor's degree, Information Technology
  • at Saudi Electronic University
  • June 2020

Information Technology

Specialties & Skills

Information Security Policy
Ethical Hacking
Cyber Security
IT Security
Risk assessment and vulnerability management
Threat intelligence and analysis
Identity and access management
Budgeting and resource allocation
Network security and firewalls
Cloud security
Leadership and Management Skills
Team building and leadership
Negotiation and conflict resolution
SACS-002 third party cybersecurity standard

Social Profiles

Personal Website
Personal Website

URL removed due to policy violation. Please contact support for further information.

Languages

Arabic
Expert
English
Intermediate

Training and Certifications

Chief Information Security Officer Certification - CISO (Certificate)
Date Attended:
December 2023
Valid Until:
January 2024
PECB Certified ISO 22301 - Business continuity management (Certificate)
Date Attended:
January 2022
PECB Certified ISO/IEC 27005 Lead Risk Manager (Certificate)
Date Attended:
May 2022
(CISM) INFORMATION SECURITY MANAGER (Certificate)
Date Attended:
July 2021
Fortinet Security professional (Certificate)
AlienVault Security Engineer (Certificate)
Date Attended:
June 2019
CEHv10 (Certificate)
CEH (Certificate)
NSE_3_Certificate (Training)
Training Institute:
Fortinet
Security + (Training)
Training Institute:
Cybrary
advanced-penetration-Testing by Cybrary (Training)
Training Institute:
Cybrary
AlienVault (Training)
Training Institute:
AlienVault
CCNP R&S Certified (Certificate)
Date Attended:
May 2015
Valid Until:
May 2018
Cryptography by Cybrary (Training)
Training Institute:
Cybrary
Date Attended:
January 2018
Cisco Cybersecurity 2018 (Certificate)
Date Attended:
June 2018
Valid Until:
June 2021
Certified Ethical Hacker 2018 (Certificate)
Date Attended:
July 2018
Valid Until:
July 2021
CCNA Security (Certificate)
CCNA (Cisco Certified Network Associate) (Certificate)
Date Attended:
February 2015
Valid Until:
January 9999
ICDL, Technical College (2004) (Certificate)
Date Attended:
January 2004
Valid Until:
January 2004

Hobbies

  • Learning