Cyber Security Manager
Confidential
مجموع سنوات الخبرة :17 years, 0 أشهر
-Develop and implement the company's cybersecurity strategy that aligns with business objectives.
-Developed and implemented security frameworks based on NAC-ECC, NIST, ISO, SAMA, and SACS-002.
-Manage the cybersecurity team and collaborate with cross-functional departments to ensure compliance with security policies and procedures.
-Conduct security assessments and risk assessments to identify potential vulnerabilities and develop strategies to mitigate risks.
-Implement and manage security tools such as SIEM, IDS/IPS, and vulnerability scanners.
-Develop and deliver cybersecurity training and awareness programs to employees to promote a security culture.
-Manage incident response activities and work with the team to identify and respond to security incidents.
-Maintain an up-to-date understanding of the threat landscape and emerging cybersecurity trends.
-Expert experience in designing and implementing security solutions
• Align overall organizational operational goals with security functions and implementations.
• Protect assets of the organization as they go through their lifecycle.
• Identify standard terms for applying physical and logical access controls to environments related to security practice.
• Appraise various access control models to meet business security requirements.
• Enhance and optimize an organization’s operational function and capacity by applying and utilizing appropriate security controls and countermeasures.
• Recognize risks to an organization’s operational endeavors, and assess specific threats, vulnerabilities, and controls.
• Ensuring the confidentiality, integrity, and availability (CIA) of assets
• Symantec Email Security/Endpoint protection Could.
• Endpoint Threat Analysis, Computer Forensics, Network Intrusion Analysis.
• Incident Response & Incident Handling, Data and Event Analysis.
• Excellent Security & Network Concepts.
• Cryptography, Host Based Analysis, Security Monitoring, Attack Methods.
• Penetration testing Perform Vulnerability assessment.
• Configuring Fortinet Firewall, Fort iCloud Sandbox.
• Configuring & manage antivirus console management (Kaspersky endpoint + FortiClient endpoint).
• Secure Routers & Switching (DHCP snooping, port security, arp inspection).
• Configuring AlienVault USM (SIEM, Asset management, Vulnerability assessment).
• Good knowledge of networking and IT Security principles, techniques and methodologies.
• Monitoring/response Microsoft Advanced Threat Analytics.
• Strong communication, negotiation and problem-solving skills.
• Design, implement and manage security tools and systems such as IDS, IPS, VPN, DLP, firewalls.
• Implement technologies and processes to increase security, simplicity, cost-effectiveness, recoverability, and overall effectiveness of the network, servers, and Supporting systems.
• Enhance the security stance of internal infrastructure and client-facing systems.
• Experience analyzing, troubleshooting, and investigating information security incidents from a variety of reporting platforms: Alien Vault USM vulnerability Monitoring systems.
• Protects system by defining access privileges, control structures, and resources.
IT Technical Support Axiom Telecom (Head Office) Al-Khober, KSA
• Configer Router Cisco, Switches, route static, rip, eigrp, igrp, ospf, STP config, VLANS Manage, Truank Mange, good in IOS,
WAN Config HDLC, PPP, SLIP, IP subntting, network topology manage, Routed Protocols IP, IPX, Apple, Wireless Manage 802.11a, 802.11b, 802.11g, 802.11n, Config Repeater, NAT Static, Dynamic, Overload, IPV6, Access Control LIst
• Monitoring and maintaining computer systems and networks
• Providing technical support and troubleshooting to customers for a software or hardware product.
• Installing and configuring computer systems & printers, diagnosing hardware/software faults and solving technical and applications problems, either over the phone or in person.
• Supporting end-users on MS Office, Outlook, Citrix and others.
• Setting up new users’ accounts and profiles and dealing with password issues in the AD.
• Responding within agreed time limits to call-outs.
• Talking staff/clients through a series of actions, either face to face or over the telephone.
• Troubleshooting system and network problems, diagnosing and solving hardware/software faults.
• Working in Linux environment.
• Performing data imaging, software backup and restore including an automatic AD backups.
• Using SQL Language ( SQL Server)
• Providing daily reports including statistical data about requests & problems solved.
• Accomplishing tasks & responsibilities with TPS (Toyota Production System) quality measurement.
• Manage windows server 2003, work with domain, backup domain, work with active directory, rest password using active directory, backup active directory,
Maintains existing applications
Creating code that meets system standards
Developing new application from beginning to end including Web-based applications (VB, SQL Server, .Net, C#, Ajax Technology and other languages).
Creating reports using Crystal Reports.
Planning using Primavera Project Management.
Managing, troubleshooting and administering network issues.
Working in SAP system (IDs) and documents controller.
Information Technology
لقد تم حذف الرابط بسبب انتهاكه لسياسة الموقع. يرجى التواصل مع قسم الدعم لمزيد من المعلومات.