علي جاسم علي البصري البصري, Cyber Security Manager

علي جاسم علي البصري البصري

Cyber Security Manager

Confidential

البلد
المملكة العربية السعودية - الدمام
التعليم
بكالوريوس, Information Technology
الخبرات
17 years, 0 أشهر

مشاركة سيرتي الذاتية

حظر المستخدم


الخبرة العملية

مجموع سنوات الخبرة :17 years, 0 أشهر

Cyber Security Manager في Confidential
  • المملكة العربية السعودية - الخبر
  • أشغل هذه الوظيفة منذ سبتمبر 2021

-Develop and implement the company's cybersecurity strategy that aligns with business objectives.
-Developed and implemented security frameworks based on NAC-ECC, NIST, ISO, SAMA, and SACS-002.
-Manage the cybersecurity team and collaborate with cross-functional departments to ensure compliance with security policies and procedures.
-Conduct security assessments and risk assessments to identify potential vulnerabilities and develop strategies to mitigate risks.
-Implement and manage security tools such as SIEM, IDS/IPS, and vulnerability scanners.
-Develop and deliver cybersecurity training and awareness programs to employees to promote a security culture.
-Manage incident response activities and work with the team to identify and respond to security incidents.
-Maintain an up-to-date understanding of the threat landscape and emerging cybersecurity trends.
-Expert experience in designing and implementing security solutions

Information Security Engineer في SSBS
  • المملكة العربية السعودية - الدمام
  • يونيو 2013 إلى أغسطس 2021

• Align overall organizational operational goals with security functions and implementations.
• Protect assets of the organization as they go through their lifecycle.
• Identify standard terms for applying physical and logical access controls to environments related to security practice.
• Appraise various access control models to meet business security requirements.
• Enhance and optimize an organization’s operational function and capacity by applying and utilizing appropriate security controls and countermeasures.
• Recognize risks to an organization’s operational endeavors, and assess specific threats, vulnerabilities, and controls.
• Ensuring the confidentiality, integrity, and availability (CIA) of assets
• Symantec Email Security/Endpoint protection Could.
• Endpoint Threat Analysis, Computer Forensics, Network Intrusion Analysis.
• Incident Response & Incident Handling, Data and Event Analysis.
• Excellent Security & Network Concepts.
• Cryptography, Host Based Analysis, Security Monitoring, Attack Methods.
• Penetration testing Perform Vulnerability assessment.
• Configuring Fortinet Firewall, Fort iCloud Sandbox.
• Configuring & manage antivirus console management (Kaspersky endpoint + FortiClient endpoint).
• Secure Routers & Switching (DHCP snooping, port security, arp inspection).
• Configuring AlienVault USM (SIEM, Asset management, Vulnerability assessment).
• Good knowledge of networking and IT Security principles, techniques and methodologies.
• Monitoring/response Microsoft Advanced Threat Analytics.
• Strong communication, negotiation and problem-solving skills.
• Design, implement and manage security tools and systems such as IDS, IPS, VPN, DLP, firewalls.
• Implement technologies and processes to increase security, simplicity, cost-effectiveness, recoverability, and overall effectiveness of the network, servers, and Supporting systems.
• Enhance the security stance of internal infrastructure and client-facing systems.
• Experience analyzing, troubleshooting, and investigating information security incidents from a variety of reporting platforms: Alien Vault USM vulnerability Monitoring systems.
• Protects system by defining access privileges, control structures, and resources.

IT Technical support في axiom telecom
  • المملكة العربية السعودية - الخبر
  • نوفمبر 2009 إلى مايو 2013

IT Technical Support Axiom Telecom (Head Office) Al-Khober, KSA

• Configer Router Cisco, Switches, route static, rip, eigrp, igrp, ospf, STP config, VLANS Manage, Truank Mange, good in IOS,
WAN Config HDLC, PPP, SLIP, IP subntting, network topology manage, Routed Protocols IP, IPX, Apple, Wireless Manage 802.11a, 802.11b, 802.11g, 802.11n, Config Repeater, NAT Static, Dynamic, Overload, IPV6, Access Control LIst
• Monitoring and maintaining computer systems and networks
• Providing technical support and troubleshooting to customers for a software or hardware product.
• Installing and configuring computer systems & printers, diagnosing hardware/software faults and solving technical and applications problems, either over the phone or in person.
• Supporting end-users on MS Office, Outlook, Citrix and others.
• Setting up new users’ accounts and profiles and dealing with password issues in the AD.
• Responding within agreed time limits to call-outs.
• Talking staff/clients through a series of actions, either face to face or over the telephone.
• Troubleshooting system and network problems, diagnosing and solving hardware/software faults.
• Working in Linux environment.
• Performing data imaging, software backup and restore including an automatic AD backups.
• Using SQL Language ( SQL Server)
• Providing daily reports including statistical data about requests & problems solved.
• Accomplishing tasks & responsibilities with TPS (Toyota Production System) quality measurement.
• Manage windows server 2003, work with domain, backup domain, work with active directory, rest password using active directory, backup active directory,

Administrator Network & Programmer في Sirti Saudi Arabia
  • المملكة العربية السعودية - الخبر
  • مارس 2007 إلى أغسطس 2009

Maintains existing applications
Creating code that meets system standards
Developing new application from beginning to end including Web-based applications (VB, SQL Server, .Net, C#, Ajax Technology and other languages).
Creating reports using Crystal Reports.
Planning using Primavera Project Management.
Managing, troubleshooting and administering network issues.
Working in SAP system (IDs) and documents controller.

الخلفية التعليمية

بكالوريوس, Information Technology
  • في Saudi Electronic University
  • يونيو 2020

Information Technology

Specialties & Skills

Information Security Policy
Ethical Hacking
Cyber Security
IT Security
Risk assessment and vulnerability management
Threat intelligence and analysis
Identity and access management
Budgeting and resource allocation
Network security and firewalls
Cloud security
Leadership and Management Skills
Team building and leadership
Negotiation and conflict resolution
SACS-002 third party cybersecurity standard

حسابات مواقع التواصل الاجتماعي

الموقع الشخصي
الموقع الشخصي

لقد تم حذف الرابط بسبب انتهاكه لسياسة الموقع. يرجى التواصل مع قسم الدعم لمزيد من المعلومات.

اللغات

العربية
متمرّس
الانجليزية
متوسط

التدريب و الشهادات

Chief Information Security Officer Certification - CISO (الشهادة)
تاريخ الدورة:
December 2023
صالحة لغاية:
January 2024
PECB Certified ISO 22301 - Business continuity management (الشهادة)
تاريخ الدورة:
January 2022
PECB Certified ISO/IEC 27005 Lead Risk Manager (الشهادة)
تاريخ الدورة:
May 2022
(CISM) INFORMATION SECURITY MANAGER (الشهادة)
تاريخ الدورة:
July 2021
Fortinet Security professional (الشهادة)
AlienVault Security Engineer (الشهادة)
تاريخ الدورة:
June 2019
CEHv10 (الشهادة)
CEH (الشهادة)
NSE_3_Certificate (تدريب)
معهد التدريب:
Fortinet
Security + (تدريب)
معهد التدريب:
Cybrary
advanced-penetration-Testing by Cybrary (تدريب)
معهد التدريب:
Cybrary
AlienVault (تدريب)
معهد التدريب:
AlienVault
CCNP R&S Certified (الشهادة)
تاريخ الدورة:
May 2015
صالحة لغاية:
May 2018
Cryptography by Cybrary (تدريب)
معهد التدريب:
Cybrary
تاريخ الدورة:
January 2018
Cisco Cybersecurity 2018 (الشهادة)
تاريخ الدورة:
June 2018
صالحة لغاية:
June 2021
Certified Ethical Hacker 2018 (الشهادة)
تاريخ الدورة:
July 2018
صالحة لغاية:
July 2021
CCNA Security (الشهادة)
CCNA (Cisco Certified Network Associate) (الشهادة)
تاريخ الدورة:
February 2015
صالحة لغاية:
January 9999
ICDL, Technical College (2004) (الشهادة)
تاريخ الدورة:
January 2004
صالحة لغاية:
January 2004

الهوايات

  • Learning