Emad Al-Sai'ari, GRC specialist

Emad Al-Sai'ari

GRC specialist

Sejel Technology

Lieu
Arabie Saoudite - Jeddah
Éducation
Master, Forensic information technology
Expérience
17 years, 8 Mois

Partager Mon CV

Empêcher usager


Expériences professionnelles

Total des années d'expérience :17 years, 8 Mois

GRC specialist à Sejel Technology
  • Arabie Saoudite - Jeddah
  • Je travaille ici depuis février 2018
Application Development Analyst à الشركة السعودية للكهرباء
  • Arabie Saoudite - Jeddah
  • juillet 1997 à octobre 2008

I worked as an Application Development Analyst at Business Systems Development Department, (Information Technology & Communication Division (GIS)). By applying the GIS system in all west region branches. I participated in gathering all information that required for the system of GIS from departments, sections, users, and the field as well. Additionally, I trained the new users in all branches about how to use the GIS system, what are the new features as well as the benefits of applying the system in the daily business. Furthermore, I participated in Quality Control in order to increase the performance and efficiency the system as well as achieve the goal of the organization in a short time by maintaining the high level of quality.

Éducation

Master, Forensic information technology
  • à Auckland University of Tecnology, AUT
  • décembre 2016

The Master of Forensics Information Technology covers the critical aspects of information security and digital forensics: * Protecting computer and network systems * Critically analyzing current security threats and planning mitigation strategies * Seizing and securing IT and other digital equipment used for criminal activity * Interpreting and analyzing the content of hard disks and other electronic media to build an understanding of the processes underpinning possible criminal activity * Gathering evidence from electronic media and other sources of potential criminal activity in a systematic and rigorous way * Presenting such evidence in a court of law in a way that is intelligible to non-experts Software Skills: • Encase, FTK, XRY, Mobile Forensics, Wireshark, Kali Linux , Metasploit, Belkasoft, Internet Examiner Toolkit, Internet Evidence Finder, Autopsy, John the Ripper, Helix3Pro, Tableau Imager (TIM), Digital Evidence & Forensics Toolkit Linux (DEFT), Ettercap, Autopsy. • Applying and Maintaining ISO/IEC 27037, SWGDE guidelines for Tool Validation Testing, and Digital Forensic Investigation Process, SWGDE Best Practices for Computer Forensics. • Project Managements, applying methodologies (Agile, PMBOK, Waterfall), MS project skills, and problem solving skills.

Baccalauréat, Computer science in Network and Security
  • à Auckland University of Technology, AUT
  • août 2013

I studied the basics and infrastructure of networking with a practical view towards developing skills that enable me to configure, implement and analyze network devices. This includes information network administration and network security to an advanced level.

Specialties & Skills

Network Systems
Computer Forensics
Ethical Hacking
Training new users
Teamwork and problem solving skills.
Investigate in LAN network incidents
Excellent ability in Microsoft Word, Excel and Power Point
Information Security Incident Handling
Risk Assessment
Project management
Quality Control system
Use different operating system
Computer Forensic Examination and Analysis
Excellent Communication and presentation skills.
Software Skills: Encase, FTK, Autopsy, John the Ripper, Tableau Imager (TIM), DEFT, Ettercap, Kali L

Langues

Anglais
Expert
Arabe
Langue Maternelle

Formation et Diplômes

Learning Styles (Certificat)
Ethical Hacking: Sniffers (Certificat)
Up and Running with CentOS Linux (Certificat)
Ethical Hacking: System Hacking (Certificat)
Ethical Hacking: Footprinting and Reconnaissance (Certificat)
Protect Your Network with Open-Source Software (Certificat)
Ethical Hacking: Denial of Service (Certificat)
Foundation of IT Security: Operating System Security (Certificat)
Practical Cybersecurity (Certificat)
Computer Forensics Essential Training (Certificat)
Ethical Hacking: Scanning Networks (Certificat)
Applying Law to Emerging Cyber Dangers (Certificat)
Introduction to Ethical Hacking (Certificat)

Loisirs

  • Swimming