حسين صائم الدهر, Managing Security consultant & Service Delivery Manager

حسين صائم الدهر

Managing Security consultant & Service Delivery Manager

IBM

البلد
المملكة العربية السعودية - الرياض
التعليم
ماجستير, Information Technology
الخبرات
15 years, 3 أشهر

مشاركة سيرتي الذاتية

حظر المستخدم


الخبرة العملية

مجموع سنوات الخبرة :15 years, 3 أشهر

Managing Security consultant & Service Delivery Manager في IBM
  • المملكة العربية السعودية - الرياض
  • أشغل هذه الوظيفة منذ يونيو 2018

Pre Sales activities, Security Services project management, Cybersecurity security services delivery and Cybersecurity solutions design.

Manager - Advisory services - Middle East & North Africa - Cyber Security في E & Y
  • المملكة العربية السعودية - الرياض
  • سبتمبر 2017 إلى ديسمبر 2017

As a Manager/Senior Consultant in the Cyber Security Team, you will contribute technically to client engagements and services development activities. An important part of your role will be to actively establish, maintain and strengthen client’s relationships. You will also identify potential business opportunities for EY within existing engagements, and escalate these as appropriate. Similarly, you will anticipate and identify risks within engagements and share any issues with senior members of the team.

In line with EY commitment to quality, you will confirm that work is of high quality and is reviewed by the next-level reviewer. As an influential member of the team, you will help to create a positive learning culture, coach and counsel junior team members and help them to develop.

Responsibilities
Participate in Cyber Security engagements with a focus on Penetration Testing, Red Team Assessment and Security Testing
Work effectively as a team member, sharing responsibility, providing support, maintaining communication and updating senior team members on progress
Help prepare reports and schedules that will be delivered to clients and other parties
Develop and maintain productive working relationships with client personnel
Build strong internal relationships within EY Advisory Services and with other service lines across the organization

Senior Information Security Assurance Officer في Ministry of Commerce
  • المملكة العربية السعودية - الرياض
  • أبريل 2017 إلى أغسطس 2017

typically include planning and implementing security measures to protect computer systems, networks and data. Information security analysts are expected to stay up-to-date on the latest intelligence, including hackers' methodologies, in order to anticipate security breaches

Security Operations Manager في International System Engineering
  • المملكة العربية السعودية - الرياض
  • أبريل 2015 إلى يوليو 2016

Manage day to day security activities, monitoring all traffics in and out the network. In addition, implementation of new projects based on the customer requirements.

Information Security Chief Analyst في tadawul
  • المملكة العربية السعودية - الرياض
  • أبريل 2014 إلى أبريل 2015

The Information Security manager is in charge of the Information Security Management function, providing line management, leadership and strategic direction for the function and liaising closely with other managers. The purpose of the Information Security Management function, in turn, is to bring the organization’s information security risks under explicit management control through the Information Security Management System.

Head of Information Security Administration في samba
  • المملكة العربية السعودية - الرياض
  • أكتوبر 2013 إلى يونيو 2014

The Information Security manager is in charge of the Information Security Management function, providing line management, leadership and strategic direction for the function and liaising closely with other managers. The purpose of the Information Security Management function, in turn, is to bring the organization’s information security risks under explicit management control through the Information Security Management System. Key responsibilities • Routine line management and leadership of staff within the Information Security Management function • Leadership and strategic direction for the function, ranging from planning and budgeting to motivational and promotional activities expounding the value of information security • Liaison with and offers strategic direction to related governance functions plus senior and middle managers throughout the organization as necessary, on information security matters such as routine security activities plus emerging security risks and control technologies • Leads the design, implementation, operation and maintenance of the Information Security Management System based on the ISO/IEC 27000 series standards, including certification against ISO/IEC 27001 where applicable • Leads or commissions the preparation and authorizes the implementation of necessary information security policies, standards, procedures and guidelines, in conjunction with the Security Committee • Leads the design and operation of related compliance monitoring and improvement activities to ensure compliance both with internal security policies etc. and applicable laws and regulations • Leads or commissions suitable information security awareness, training and educational activities • Leads or commissions information security risk assessments and controls selection activities • Commissions activities relating to contingency planning, business continuity management and IT disaster recovery in conjunction with relevant functions and third parties

Acting Head of Technology Infrastructure Projects Management في Samba
  • المملكة العربية السعودية - الرياض
  • أكتوبر 2012 إلى أكتوبر 2013

Over all management, supervision, control and implementing all Enterprise IT Operations data, voice, video and Windows platform projects domestically and internationally. The position tasks are to overlook the following:
1. Network Security and Network infrastructure design, deployment, process and procedures. These include E-Commerce network for national stock trading (Tadawul), corporate banking (B2B), and individual online-banking (B2C).
2. Country Communication Division representation in all technology projects for the entire group.
3. Network and security infrastructure equipment’s and vendor evaluation and selection.
4. Windows platform related projects. E-mail, Internet access, Net-backup infrastructure, design, deployment, process and procedures.

PhD IT Researcher & Investigator في University of Tasmania
  • استراليا
  • أغسطس 2010 إلى سبتمبر 2012

Over all involvement in any Information Security investigation in University of Tasmania. These include copy right protection, user’s privileges and un-authorized access.

Manager في Saudi British Bank
  • المملكة العربية السعودية - الرياض
  • أكتوبر 2008 إلى يناير 2009

My Role was mainly: Enforcing policies, preventing Security risks and Troubleshooting problems.

Assistance Manager في Samba Financial Group
  • المملكة العربية السعودية - الرياض
  • سبتمبر 2006 إلى أكتوبر 2008

Administrator for the following systems: HP Open View Systems, Cisco ACS, Blue coat Proxies, Windows Exchange, Black Berry and DNS.

الخلفية التعليمية

ماجستير, Information Technology
  • في University of Tasmania
  • أغسطس 2011

1. Critically evaluate the security risks associated with a company network and develop policies for risk assessment and ethical use for that network. 2. Evaluate and apply ethical scanning techniques to a company network and gather information about potential vulnerabilities. 3. Use basic Intrusion Detection and Forensic tools. 4. Implement firewalls and access control for a company network. 5. Target basic vulnerability exploits at a network and understands how they work and how to defend against such attacks. 6. Analyze threats in terms of their impact on network design and coding practice and present solutions which can defeat basic threats.

بكالوريوس, Computer Science
  • في Prince Saultan University
  • سبتمبر 2006

focusing on the fundamentals of all sector of computer science

Specialties & Skills

Managed Security Services
Security Services
IT Project Management
Cyber Security
Good Communicator
Systems: Some Unix-Based Systems (Solaris, Linux); Windows (all)
Security Technologies: Back Track 4 / 5; Metasploits; SSH; SSL; Digital Certificates; N-map; Retina
Networking: LANs, WANs, VPNs, Routers, Firewalls, TCP/IP, IPSs, IDSs
Management
Troubleshooting
Security investigation
security consultanting
project management

اللغات

العربية
متمرّس
الانجليزية
متمرّس

العضويات

University of Tasmania
  • Alumin
  • August 2011

التدريب و الشهادات

RSA Security Analytics Administration (تدريب)
معهد التدريب:
RSA
تاريخ الدورة:
May 2014
المدة:
40 ساعة
Certified Incident Handling Engineer (CIHE) (الشهادة)
تاريخ الدورة:
December 2014
صالحة لغاية:
December 2017
Certified ISO 27001 Implementer (الشهادة)
CEH (الشهادة)
تاريخ الدورة:
September 2010
صالحة لغاية:
September 2010
BCCPP (الشهادة)
تاريخ الدورة:
September 2007
صالحة لغاية:
September 2007

الهوايات

  • Movies
  • Reading
  • Sports