IT Infrastructure & Security Specialist
Innovative Software Inc, KSA
Total years of experience :20 years, 4 Months
Manage all activities related to Infrastructure and Service Management across Company
Core activities may consist of systems planning, information security planning, performance
management, capacity planning, testing and validation, risk assessment, benchmarking,
information engineering, and development and staffing of a systems engineering or security
management plan
⮚ Develop solution architectures for various enterprise systems across the business, mainly in
Network, Cloud platforms, service management and security
⮚ Manage and monitor Data Center, network and telephony infrastructure on premise and cloud
based (OpenStack)
⮚ Managing 100+ Unix/Linux base servers
⮚ Create documentation concerning IT systems Security and IT procedures
⮚ Manage IT standards, procedures, policies, and best practices
⮚ Develop and communicate standards of use, operations and security of network
⮚ Designing and implementing safety measures and controls
⮚ Monitoring network activity to identify vulnerable points
⮚ Acting on privacy breaches and malware threats
⮚ Monitor and analyze Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and
Security Information and Event Management (SIEM)
Worked closely with management teams to plan, develop, coordinate and execute technical
strategies aligned to client's vision, mission and purpose
* Assessed existing systems including billing automation, accounting and real-time reporting and
analytics capabilities, delivering updates for security purposes
* Identified computer hardware and network system issues, performing troubleshooting
techniques for remediation
* Reviewed and assessed architecture design, implementation, testing and deployment needs to
identify project requirements and costs
* Coordinated with management teams to plan, develop, align and execute strategies that would
meet client's vision, mission and purpose
* Analyzed architecture design, scoping, implementation, testing and deployment needs to define
project requirements
* Analyzed network security and current infrastructure to assess areas in need of improvement
and develop solutions
* Provided technology consultation for growing businesses, making recommendations and
upgrading existing systems
* Established communication infrastructures, including LAN and WAN networks for
communication and mobile device applications
Gives assistance investigator officer to find out corruption in financial market through
Technology.
* Analyzing computer system crimes
* Recovering data that was either destroyed or damaged.
* Gathering evidence.
* Reconstructing damaged computer systems.
* Preparing expert reports on highly complex technical matters.
* Testifying in court.
* Training law enforcement on computer related issues.
* Draft expert testimony, affidavits, and reports.
* Recover password protected/encrypted files and hidden information
Determine the most effective way to protect computers, networks, software, data and information systems against any possible attacks
Interview staff and heads of departments to determine specific security issues
Perform vulnerability testing, risk analyses and security assessments
Research security standards, security systems and authentication protocols
Prepare cost estimates and identify integration issues for IT project managers
Plan, research and design robust security architectures for any IT project
Test security solutions using industry standard analysis criteria
Provide technical supervision for (and guidance to) a security team
Management of IT Infrastructure, Systems & Network of entire South Region.
* Responsibility for IT Strategy, planning and budgeting, operations, service level, vendor
relationship and team management.
* Managing of IT projects, people, resources and activities in the region.
* Maintenance of Lease, ISDN & MPLS Lines & VPN with Cisco and Nortel Routers for the
connectivity of all the branches and Regional Office with the NAB Headquarter
(Islamabad).
* Technical Support, System Uptime (24/7), Problem solving, Staff Training, Recruitment &
Up gradation (as per requirement) of entire System in South.
* In-House Maintenance of Red Hat Enterprise Linux 5 Server at Regional Office and
Branches. Implementation & Maintenance of AMS (Accountability Management System)
AMIR RAZA MIR Page 5
and store Archiving Data through FTP on Headquarter.
Additional duties performed As Cybercrime and Forensics Investigators,
* Mobile/Credit Card / Balance Transfer Fraud
* Bank Fraud Credit Cards/ ATM/Loan
* Threatening/Abusive/ Massages & Emails
* Fraudulent Emails
* Electronic Money Laundering and Tax Evasion
* Electronic Funds Transfer Fraud
* Communications in furtherance of Criminal Conspiracies
* Writing reports and documenting procedures
* Testifying in court
Reporting Channel
My primary duties were to monitor and troubleshoot problems at the network on AX-400.
Involved in migration of production application onto different servers
* Primary involved in Network Administrator and Support
* Router and switch configuration
* Research & Documentation
Rrecognized by HEC), Final Year Project: A New Transport Protocol (nUDP) Module for the Network Simulator
courses: AND CERTIFICATION * AIX 7.1 certification Course Training by IBM * Virtualization Of IBM Power System AIX 7.1 Training Certification Course by IBM
in