Maximum upload file size: 3MB. File types allowed: jpg, jpeg, gif only.

Click the above 'Browse' button to select a photo.
Guidelines
  1. Only upload a photograph of yourself
  2. Photos of children, celebrities, pets, or illustrated cartoon characters will not be approved
  3. Photos containing nudity, gore, or hateful themes are not permissible and may lead to the cancellation of your account
  4. Photos of your passport, ID, or photos containing any personal information such as your address, passport number, or contact details are not permissible for your own security.

Delete Guidelines

Ahmed Fathy

Information Security Specialist

UAE University

Location:
United Arab Emirates - Al Ain
Education:
Master's degree, IT(Specialised in Cyber Security) accredited by the Middle States Commission on Higher Education in
Experience:
26 years, 6 months

Work Experience

What's your work experience? Your experience is one of the most important sections in a CV.
List all relevant responsibilities, skills, projects, and achievements against each role.  If you're a fresh grad, you can add any volunteer work or any internship you've done before.
Add Experience

Total Years of Experience:  26 Years, 6 Months   

July 2001 To Present

Information Security Specialist

at UAE University
Location : United Arab Emirates - Al Ain
• Negotiating terms, conditions, managing the relationships with IT vendors, and ensuring compliance with group policies in this regard.
• Placing PO’s following up on delivery installation, testing, acceptance and providing sign-off to Manager Architecture and Security for approval of payments.
• Updating inventory records and maintaining an up to date record of the IT asset inventory.
• Playing a key role in the compilation of the annual IT budget and tracking actual expenses against budget.
• Controlling, Monitoring and safeguarding of all IT assets - both hardware and software
• Supporting the Manager Architecture & Security in ensuring compliance with group IT Asset Management requirements and software license tracking.
• Consolidating the budgets of operations and tracking the actual vs spend of ops on a consolidated basis so as to facilitate easy compilation of CIO Review pack.
• IT Performance Measurement & Reporting
• Generate / Prepare periodic reports such as User Internet activity, Hardening compliance report, EPO reports etc
• Assist regional IT in providing technical support (also handling users support request)
• Review, design of IT Security infrastructure & Security Operations Center (SOC)
• Vulnerability analysis of critical systems, applications and network entities
• Security for Enterprise Mobility and Cloud Services

• Planning, execution, fact findings with evidences and issuance of report with objectives, scope and audit approach (implemented security frameworks i.e. COBIT, ITGC, ISO/IEC 27001 & GCC)
• Design, review, cost-benefit analysis, operation and monitoring of internal security controls for Cloud Services, Enterprise Mobility, Database Security & Security in new services ).
• Implementation of Control Management System (ICAS) for effective monitoring of controls.
• Design & architecture of security infrastructure (Firewalls, IDS, IPS, AV’s and SIEM) using Zachman framework.
• Establishment of Security Operations Center (SOC) for real-time traffic analysis (NetXMS, WireShark & Splunk), severe security events like APT’s or ATT’s (using CA’s ELM) and penetration attempts (using McAfee IntruShield, Cisco Firewalls & McAfee DLP featuring Device Control, Endpoint, Monitor, Prevent & Discover) for the security of Data Center, GSM Network, Enterprise Data Network & End Point.
• Antivirus administration for all servers & client PCs & ensuring the organization network is free from Viruses
• Support Logging and Monitoring activities by review of system logs on periodic basis and initiating actions / escalation as required
• Work closely with information Security team to implement and maintain system security controls based on group information security policies
• Provide support to the IT Director, CEO and Manager Architecture and Security on projects, documentation, group policy compliance, IT procedure development etc as ad when required. Direct point of contact to the Stakeholders for IT support and services.
• Support the IT planning activity particularly with respect to collation of information documentation.
February 2001 To July 2001

Computer Lecturer and Curriculum Developer- Part Time

at Ajman University
Location : United Arab Emirates - Ajman
• Taught multimedia course applications
• Participated in the development of educational technology courses
October 2000 To May 2001

Network Administartor and IT Instructor

at Arab University College
Location : United Arab Emirates
• Teach IT Courses
• Lead and manage and report day-to-day backup and recovery support activities.
• Ensuring backup and recovery systems and processes are compliant with corporate policies.
• Help team to monitor and administer BE 2010/2012/2014 Beta1 application, administrative processes such as expirations, migration, reclamation and collocation, offsite vaulting, tape/media rotations, etc
• Detect/diagnose and resolve hardware issues (server, tape library etc) and interface with vendor, manufacturer of H/W and S/W as necessary
• Ensure that all backup servers, tape library hardware and software are maintained at vendor recommended support levels including system firmware code and that all critical hardware and corresponding appropriate software is placed on service/maintenance contracts. Follow up, periodically with software upgrades, scheduling for planned implementation of upgrade activities.
• Ensure all critical systems are backed up and secured. Enforce, review, supplement and update backup and recovery strategies as needed.
• Ensure all hardware, peripherals are maintained in working order and repaired immediately in the event of failures or malfunction, verify and proactively maintain support agreements and contracts.
• Ensure that PCs, notebooks, printers and other IT equipment are set up and configures to standards, the standards are reviewed with respect to changes occurring in technology, and continued compliance is evidenced through periodic checks. (eg w/s back up process, installation of licensed software, hard disk encryption, device hardening standards, remote usage configuration, shared printer connections, patch updates etc)
• Monitor threats such as virus, spam, etc and initiate defensive actions both on a proactive preventative basis as well as on an incident basis.
• Troubleshooting diagnosing and resolving system. Hardware and network failures
• Worked with hardware and software vendors to maintain and support IT systems
• Support Remote (Citrix/checkpoint) VPN Users.
• Ensure access to local and group Intranet applications and actively monitor accessibility. Provide user support for issue resolution witht Intranet application and support the installation and setup of new intranet applications as and when required.
• Support Manager Architecture and Security on activities such as capacity planning, system expansion, resilience reviews, new technology evaluation etc..
• Shadow routine Data Backup and Recovery activities and have full understanding of internal and off site tape management processes to support the activity as and when required.
September 1997 To October 2000

Electronic Library Director and

at Technology Development Center
Location : Egypt
Electronic Library Director and
Administrator to the Advisor for the Egyptian Ministry of Education

Responsibilities included:
• Managed 28 Technology Development Centers across Egypt
• Supervised a staff of twelve professional and non professional librarians
• Managed all reference and technical services for the Electronic Library
• Performed a needs analysis and adapted the collection accordingly
• Trained all new hires and associates in the use of the library’s electronic and print sources
• Revised and negotiated new contracts with all outside vendors

Education

What's your educational background?
Let employers know more about your education; remember, be clear and concise.
October 2013

Master's degree, IT(Specialised in Cyber Security) accredited by the Middle States Commission on Higher Education in

at Zayed University
Location : United Arab Emirates - Dubai
Grade: 3.89 out of 4
Distinction with Honors.

Accredited by the Middle States Commission on Higher Education in the United State
January 2007

Higher diploma, Microsoft Certified System Engineer (MCSE)

at AL Khawariznmi International College
Location : United Arab Emirates
Grade: 97 out of 100
Microsoft Certified Professional
Microsoft Certified System Administrator
Microsoft Certified System Engineer
July 2000

Higher diploma, Curriculum Development and Planning

at Helwan University
Location : Cairo, Egypt
Grade: 91 out of 100
Curriculum Development and Planning
August 1999

Higher diploma, Educational Technology

at Helwan University
Location : Cairo, Egypt
Grade: 91 out of 100
Educational Technology
Grade : Excellent with HONOR
May 1997

Bachelor's degree, Educational Technology

at Helwan University
Location : Cairo, Egypt
Grade: 90 out of 100
Educational Technology

Specialties & Skills

Internet / Computer and Digital Cybercrime Investigator

Information Security Officer

Network Security

Computer Lecturer

Database Designer

Multimedia Designer

Network Administrator

Network Forensics

Network Engineering

System Administration

Network Security

Administration

Languages

Do you speak more than one language?
For some jobs, fluency in one or more foreign languages is a plus, so add your language skills to get better results.

English

Expert

Arabic

Expert

French

Beginner

Training and Certifications

Hands on Training ( Training )

FTK - EnCase - X-Ways Forensics
March 2012

Hands on Training ( Training )

Database and Entrerprise Security
May 2012

Hands on Training ( Training )

Network and Internet Secuirity
February 2012

Hands on trainig ( Training )

Cyber Forensics
March 2012

Hands on training ( Training )

Information Security , Policy , Ethics and Law
November 2011

Hands on training ( Training )

Information Security
October 2011

Hands On Training ( Training )

MCSE
October 2006

Loading
Loading...
Loading...