Managing Security consultant & Service Delivery Manager
IBM
مجموع سنوات الخبرة :15 years, 3 أشهر
Pre Sales activities, Security Services project management, Cybersecurity security services delivery and Cybersecurity solutions design.
As a Manager/Senior Consultant in the Cyber Security Team, you will contribute technically to client engagements and services development activities. An important part of your role will be to actively establish, maintain and strengthen client’s relationships. You will also identify potential business opportunities for EY within existing engagements, and escalate these as appropriate. Similarly, you will anticipate and identify risks within engagements and share any issues with senior members of the team.
In line with EY commitment to quality, you will confirm that work is of high quality and is reviewed by the next-level reviewer. As an influential member of the team, you will help to create a positive learning culture, coach and counsel junior team members and help them to develop.
Responsibilities
Participate in Cyber Security engagements with a focus on Penetration Testing, Red Team Assessment and Security Testing
Work effectively as a team member, sharing responsibility, providing support, maintaining communication and updating senior team members on progress
Help prepare reports and schedules that will be delivered to clients and other parties
Develop and maintain productive working relationships with client personnel
Build strong internal relationships within EY Advisory Services and with other service lines across the organization
typically include planning and implementing security measures to protect computer systems, networks and data. Information security analysts are expected to stay up-to-date on the latest intelligence, including hackers' methodologies, in order to anticipate security breaches
Manage day to day security activities, monitoring all traffics in and out the network. In addition, implementation of new projects based on the customer requirements.
The Information Security manager is in charge of the Information Security Management function, providing line management, leadership and strategic direction for the function and liaising closely with other managers. The purpose of the Information Security Management function, in turn, is to bring the organization’s information security risks under explicit management control through the Information Security Management System.
The Information Security manager is in charge of the Information Security Management function, providing line management, leadership and strategic direction for the function and liaising closely with other managers. The purpose of the Information Security Management function, in turn, is to bring the organization’s information security risks under explicit management control through the Information Security Management System. Key responsibilities • Routine line management and leadership of staff within the Information Security Management function • Leadership and strategic direction for the function, ranging from planning and budgeting to motivational and promotional activities expounding the value of information security • Liaison with and offers strategic direction to related governance functions plus senior and middle managers throughout the organization as necessary, on information security matters such as routine security activities plus emerging security risks and control technologies • Leads the design, implementation, operation and maintenance of the Information Security Management System based on the ISO/IEC 27000 series standards, including certification against ISO/IEC 27001 where applicable • Leads or commissions the preparation and authorizes the implementation of necessary information security policies, standards, procedures and guidelines, in conjunction with the Security Committee • Leads the design and operation of related compliance monitoring and improvement activities to ensure compliance both with internal security policies etc. and applicable laws and regulations • Leads or commissions suitable information security awareness, training and educational activities • Leads or commissions information security risk assessments and controls selection activities • Commissions activities relating to contingency planning, business continuity management and IT disaster recovery in conjunction with relevant functions and third parties
Over all management, supervision, control and implementing all Enterprise IT Operations data, voice, video and Windows platform projects domestically and internationally. The position tasks are to overlook the following:
1. Network Security and Network infrastructure design, deployment, process and procedures. These include E-Commerce network for national stock trading (Tadawul), corporate banking (B2B), and individual online-banking (B2C).
2. Country Communication Division representation in all technology projects for the entire group.
3. Network and security infrastructure equipment’s and vendor evaluation and selection.
4. Windows platform related projects. E-mail, Internet access, Net-backup infrastructure, design, deployment, process and procedures.
Over all involvement in any Information Security investigation in University of Tasmania. These include copy right protection, user’s privileges and un-authorized access.
My Role was mainly: Enforcing policies, preventing Security risks and Troubleshooting problems.
Administrator for the following systems: HP Open View Systems, Cisco ACS, Blue coat Proxies, Windows Exchange, Black Berry and DNS.
1. Critically evaluate the security risks associated with a company network and develop policies for risk assessment and ethical use for that network. 2. Evaluate and apply ethical scanning techniques to a company network and gather information about potential vulnerabilities. 3. Use basic Intrusion Detection and Forensic tools. 4. Implement firewalls and access control for a company network. 5. Target basic vulnerability exploits at a network and understands how they work and how to defend against such attacks. 6. Analyze threats in terms of their impact on network design and coding practice and present solutions which can defeat basic threats.
focusing on the fundamentals of all sector of computer science