Emad Al-Sai'ari, GRC specialist

Emad Al-Sai'ari

GRC specialist

Sejel Technology

Location
Saudi Arabia - Jeddah
Education
Master's degree, Forensic information technology
Experience
17 years, 7 Months

Share My Profile

Block User


Work Experience

Total years of experience :17 years, 7 Months

GRC specialist at Sejel Technology
  • Saudi Arabia - Jeddah
  • My current job since February 2018
Application Development Analyst at الشركة السعودية للكهرباء
  • Saudi Arabia - Jeddah
  • July 1997 to October 2008

I worked as an Application Development Analyst at Business Systems Development Department, (Information Technology & Communication Division (GIS)). By applying the GIS system in all west region branches. I participated in gathering all information that required for the system of GIS from departments, sections, users, and the field as well. Additionally, I trained the new users in all branches about how to use the GIS system, what are the new features as well as the benefits of applying the system in the daily business. Furthermore, I participated in Quality Control in order to increase the performance and efficiency the system as well as achieve the goal of the organization in a short time by maintaining the high level of quality.

Education

Master's degree, Forensic information technology
  • at Auckland University of Tecnology, AUT
  • December 2016

The Master of Forensics Information Technology covers the critical aspects of information security and digital forensics: * Protecting computer and network systems * Critically analyzing current security threats and planning mitigation strategies * Seizing and securing IT and other digital equipment used for criminal activity * Interpreting and analyzing the content of hard disks and other electronic media to build an understanding of the processes underpinning possible criminal activity * Gathering evidence from electronic media and other sources of potential criminal activity in a systematic and rigorous way * Presenting such evidence in a court of law in a way that is intelligible to non-experts Software Skills: • Encase, FTK, XRY, Mobile Forensics, Wireshark, Kali Linux , Metasploit, Belkasoft, Internet Examiner Toolkit, Internet Evidence Finder, Autopsy, John the Ripper, Helix3Pro, Tableau Imager (TIM), Digital Evidence & Forensics Toolkit Linux (DEFT), Ettercap, Autopsy. • Applying and Maintaining ISO/IEC 27037, SWGDE guidelines for Tool Validation Testing, and Digital Forensic Investigation Process, SWGDE Best Practices for Computer Forensics. • Project Managements, applying methodologies (Agile, PMBOK, Waterfall), MS project skills, and problem solving skills.

Bachelor's degree, Computer science in Network and Security
  • at Auckland University of Technology, AUT
  • August 2013

I studied the basics and infrastructure of networking with a practical view towards developing skills that enable me to configure, implement and analyze network devices. This includes information network administration and network security to an advanced level.

Specialties & Skills

Network Systems
Computer Forensics
Ethical Hacking
Training new users
Teamwork and problem solving skills.
Investigate in LAN network incidents
Excellent ability in Microsoft Word, Excel and Power Point
Information Security Incident Handling
Risk Assessment
Project management
Quality Control system
Use different operating system
Computer Forensic Examination and Analysis
Excellent Communication and presentation skills.
Software Skills: Encase, FTK, Autopsy, John the Ripper, Tableau Imager (TIM), DEFT, Ettercap, Kali L

Languages

English
Expert
Arabic
Native Speaker

Training and Certifications

Learning Styles (Certificate)
Ethical Hacking: Sniffers (Certificate)
Up and Running with CentOS Linux (Certificate)
Ethical Hacking: System Hacking (Certificate)
Ethical Hacking: Footprinting and Reconnaissance (Certificate)
Protect Your Network with Open-Source Software (Certificate)
Ethical Hacking: Denial of Service (Certificate)
Foundation of IT Security: Operating System Security (Certificate)
Practical Cybersecurity (Certificate)
Computer Forensics Essential Training (Certificate)
Ethical Hacking: Scanning Networks (Certificate)
Applying Law to Emerging Cyber Dangers (Certificate)
Introduction to Ethical Hacking (Certificate)

Hobbies

  • Swimming