Muhammad Rehan Khan, Senior Information Security Officer

Muhammad Rehan Khan

Senior Information Security Officer

Central Power Purchasing Agency Limited

Location
Pakistan - Islamabad
Education
Master's degree, Information Security
Experience
8 years, 9 Months

Share My Profile

Block User


Work Experience

Total years of experience :8 years, 9 Months

Senior Information Security Officer at Central Power Purchasing Agency Limited
  • Pakistan - Islamabad
  • My current job since July 2019

• Provided comprehensive on-going leadership and support for a variety of information security-related projects including sole leadership and strategic direction for information security management while reporting directly to the CIO, contributed to the cyber assessment metrics and GRC reporting to senior management to influence risk-based results. • Developed comprehensive policies, security controls and procedures to safeguard organizational assets, ensure data integrity, availability and confidentiality, which seamlessly integrate with existing operations and ensures adoption of best practices to improve IT service delivery, and security of classified data belonging to CPPA-G and policies that supported the objectives, requirements and business continuity in-line with organization information security plans and ensured compliance with all government, industry regulations.
• Created and launched Information Security Awareness program at various organizational levels in collaboration HR&A functions, increasing Information Security by E-Learning (LMS) that allows employees to access material from anywhere, at any time and gives the ability to take training courses during lower production periods, instead of attending in-person seminars and reduced company capital on professional trainers.
• Developed and implemented the Information Security risk management program and conducted thorough risk assessment of all IT and non-IT assets that identified gaps and areas for improvement of risk posture, developing solutions for remediating or mitigating risks, assessing the residual risk and monitor progress towards plan implementation.
• Introduced a comprehensive reporting system, which ensures ease of reporting any issues faced by employees, and their timely resolution through investigations by dedicated teams.
• Introduced a Monitoring system to ensure 24/7 physical and environmental security, with periodic checks to verify integrity of each security control adopted, under the authority of Human Resource Department.
• Adoption of IT Service Desk Management System to initiate an automated ticketing system, asset management, incident & problem management, configuration management and knowledge management resulting in improved operational efficiency, increased staff productivity, improved accountability within business functions through standardization.
• Ensured adoption of best practices to improve the quality of in-house application development. These best practices ensure baseline security and extensive quality checks, ensuring a better control over the problems faced during development of multi-layered solutions.
• Elaborated a comprehensive business continuity plan for established IT services, customized data backup policies, based on the type of data being processed and retained. Ensuring extremely reduced downtime to avoid disruption of business-critical services and mitigate financial risks.
• Budgeting and cost control for the Information Security’s Project by reducing IS capital expenditure and operating expenditure costs through consolidation and re-negotiation of key contracts.
• Drive & delivered the internal initiative to certify CPPA-G’s Information Security Management System and Information Technology Service Management System to be vetted by ISO27001 and ISO20000.
• Planned, deployed, and administered DARKTRACE DETECT & RESPOND Network Threat Detection and Response System to detect and respond autonomously to unpredictable and novel cyber-threats for containment and disarmament.
• Lead deployment and administered Infoblox’s BloxOne Threat Defense Advanced Secure Recursive DDI system to protect corporate users and roaming users from DNS based Threat Vectors and to provide visibility on DNS protocol.
• Deep Security Management to protect protect enterprise applications and data from breaches and business disruptions without requiring emergency patching.

System Auditor at Ministry of Interior, Government of Pakistan
  • Pakistan - Islamabad
  • April 2016 to July 2019

• Conducted audits on information technology (IT), operating systems (OS)platforms and operating procedures in accordance with established standards for efficiency, accuracy, security, and risk mitigation.
• Identified control gaps in processes, procedures, policies and systems through in-depth research and assessment and suggested methods for improvement
• Evaluated IT infrastructure in terms of risks to the organization and established controls to mitigate loss. Determined and recommended improvements to enterprise risk management controls
• Supervised engagements by planning audits, reviewed work papers, and prepared audit reports
• Demonstrate ability to identify control weaknesses, follow up on potential issues and document high quality audit issues with clear description of the finding, risk, and management action plans.
• Identified management control flaws and made value-added recommendations for improvement
• Managed project status: facilitated audit status meetings to communicate findings, issue, and areas for improvement to senior management and executive leadership.
• Created final audit reports, and oversee implementation of corrective action plans, while maintaining communications with all levels of management and prepare draft reports for review by department management.

Linux System Engineer at 3S Business Technologies Pvt Ltd
  • Pakistan - Islamabad
  • September 2015 to April 2016

➢ Postfix Mail Server: Configure a mail server to exchange mails within the organization employees.

➢ ElasticSearch / Logging-Server: Configure the Logging Server to store and monitor logs.

➢ Nagios Monitoring Server: Keeping an inventory of servers, and making sure critical services are up and running.

➢ Zentyal Server: Creating Zentyal server to add multiple domains and add multiple users for each domain, configuring Odoo Server to use Zentyal LDAP user and to make sure they logged in into Zentyal virtual domains.

Education

Master's degree, Information Security
  • at National University of Sciences and Technology, Islamabad, Pakistan
  • February 2018

Thesis ZeuS Malware : Analysis & Detection

Bachelor's degree, Information Technology
  • at UET Taxila
  • June 2013

UET Taxila - June, 2013 Bachelors: B.E IT (Information Technology)

Specialties & Skills

Storage Area Networks
Access Networks
International Networks
Wireless Sensor Networks
Voice Networks
Packet Tracer
PHP(Code igniter Framework)
IP Routing & Switching
Dot Net Framework
C-Language
JAVA(Network Programming)
Javascript
CMS Frameworks
C++ (OOP)
PKI System
ISO20000:2018
ISO270001:2013
Information Security Management
Information Security Risk Management
Vulnerability Management
Information Security Policies
Network Security Management
endpoint security
security
cyber security
risk management
vulnerability assessment

Languages

Pushto
Expert
Urdu
Expert
English
Intermediate

Training and Certifications

Certified Information Security Manager (CISM) (Certificate)
Date Attended:
September 2022
DNS for Security Practioners (DSP) (Training)
Training Institute:
Infoblox
Date Attended:
April 2022
Duration:
10 hours
Certified Information Systems Security Professional (CISSP_ (Training)
Training Institute:
Security Experts
Date Attended:
February 2022
Duration:
40 hours
Certified Ethical Hacker (CEH) (Certificate)
Date Attended:
June 2021
Valid Until:
July 2024
CISA (Training)
Training Institute:
NUST
Date Attended:
April 2015
Duration:
60 hours
CCNA (Training)
Training Institute:
Ciscom
Date Attended:
July 2014
Duration:
60 hours