Senior Consultant
Devoteam
Total years of experience :19 years, 10 Months
Digital Infrastructure Architect
Digital Infrastructure strategy Lead
Information Security Architect
Information Security Strategy Lead
Application Architect
Cloud Architect
Blockchain Architect
1. Evaluating and undertaking impact analysis of major system design options
2. Assessing and managing associated risks and make trade-offs ensuring an adequate balance between service quality, reliability, and costs
3. Providing advice on technical aspects of systems development and integration
4. Providing professional advice and guidance to clients in the implementation of digital technologies, to improve operational performance.
5. Translating the customer needs into business and technology solutions and provide a pathway to successful implementation.
6. Driving decisions and providing consultation around digital transformation, the customer transformation roadmap, and ensure technology and business solutions align with business requirements.
7. Developing digital strategies and implementing digital transformation in large organizations
8. Leading projects through all phases of the lifecycle
9. Identifying the pain-points for existing solutions or customer operations.
10. Gather the Solution Requirements and Prepare business requirements document.
11. Prepare detailed analysis document with complete awareness with the appropriate techniques and well definition for functional and non-functional requirements.
12. Support developers and QC engineers by clarifying requirements or business concerns raised anytime within the development life cycle.
13. Perform market analysis and research.
14. Demonstrate to stakeholders the solution scope, business value, solution design, requirements, and identified risks.
15. Developing Go-to-Market initiatives with measurable ROI to meet product financial targets
16. Providing pre-sales support to the sales team in enterprise mobility / Cyber Security/ IT Infrastructure solution engagement - consulting, identification of pain-points, generation of needs, and engineer solutions on end-to-end basis to meet end requirements.
17. Maintaining information technology strategies by managing staff; researching and implementing technological strategic solutions.
18. Designing training programs and workshops for staff as needed.
19. Conducting regular system audits
20. Implementing ITSM via ITIL framework for large organizations
21. Implementing ISO 27K framework for large organizations
1. ISO 27001 Implementation, Maintaining & Management Review
2. Defining Information Security Awareness requirements & solutions
3. Performing a Security Penetration Testing
4. Performing a Security Risk & Vulnerability Assessment
5. Performing a Network Security Assessment
6. Providing a Continuous Security Design Enhancement
7. Providing a Continuous Network Design Enhancement
8. Lead a continued process of operating system’s patching, updates & upgrade for both windows & Linux servers & windows desktops
9. Lead a continued process of product’s patching and updates
10. Building an Information Security & Infrastructure enhancement roadmap
11. Managing the Azure Cloud Infrastructure (ASM & ARM)
12. Deploying & Managing the Azure Cloud Security
13. Leading the Migration process from On-Premises to Azure cloud
14. Deploying & Managing Azure OMS
15. Implementing Nutanix HyperConverged Infrastructure (Prism, AHV & HYCU)
16. Deploying & Managing Solarwinds LEM
17. Administering & Managing Syslog Server
18. Deploying & Managing Big-IP Local Traffic Manager LTM
19. Deploying & Managing AVI Application Delivery Controller
20. Deploying & Managing Citrix Netscaler (SDX, MPX & VPX)
21. Deploying & Managing Big-IP Application Delivery & Security ASM
22. Deploying & Managing Palo Alto NGFW
23. Deploying & Managing FortiGate NGFW
24. Deploying & Managing Juniper SRX Data Center Firewall
25. Deploying & Managing Pulse Policy Secure
26. Deploying & Managing Pulse Connect Secure
27. Deploying & Managing Trend Micro Office Scan XG
28. Deploying & Managing Trend Micro Deep Security
29. Deploying & Managing Trend Micro Smart Protection
30. Deploying & Managing Trend Micro Control Manager
31. Deploying & Managing Trend Micro Deep Discovery Inspector
32. Deploying & Managing Trend Micro Deep Email Discovery Inspector.
33. Administering & Managing Kaspersky Security Center 10
34. Administering & Managing Kaspersky Endpoint Security 10 for Windows/Linux/Mac
35. Administering & Managing Kaspersky Security 10 for Windows Server
36. Administering & Managing Kaspersky Security for Virtualization 4.0
37. Administering & Managing Cisco & Huawei Telepresence Systems
38. Providing level 2 & 3 Support for network routers & switches
39. Implementing VMware Private Cloud Environment vSphere & vCenter
40. Implementing Microsoft Hyper-v Private Cloud
1. Performing a Security Penetration Testing
2. Performing a Security Risk & Vulnerability Assessment
3. Performing a Network Security Assessment
4. Providing a Continuous Security Design Enhancement
5. Providing a Continuous Network Design Enhancement
6. Lead a continued process of operating system’s patching, updates & upgrade for both windows & Linux servers & windows desktops
7. Lead a continued process of product’s patching and updates
8. Building an Information Security & Infrastructure enhancement roadmap
9. Managing the Azure Cloud Infrastructure (ASM & ARM)
10. Deploying & Managing the Azure Cloud Security
11. Deploying & Managing Solarwinds LEM
12. Administering & Managing Syslog Server
13. Deploying & Managing Big-IP Local Traffic Manager LTM
14. Deploying & Managing Big-IP Application Delivery & Security ASM
15. Deploying & Managing Palo Alto NGFW
16. Deploying & Managing Juniper SRX Data Center Firewall
17. Deploying & Managing Pulse Policy Secure
18. Deploying & Managing Pulse Connect Secure
19. Deploying & Managing Bluecoat ProxySG
20. Deploying & Managing Bluecoat AV
21. Deploying & Managing Bluecoat Reporter
22. Administering & Managing Kaspersky Security Center 10
23. Administering & Managing Kaspersky Endpoint Security 10 for Windows/Linux/Mac
24. Administering & Managing Kaspersky Security 10 for Windows Server
25. Administering & Managing Kaspersky Security for Virtualization 4.0
26. ISO 27001 Implementation, Maintaining & Management Review
27. Defining Information Security Awareness requirements & solutions
28. Administering & Managing Cisco & Huawei Telepresence Systems
29. Providing level 2 & 3 Support for network routers & switches
30. Implementing VMware Private Cloud Environment vSphere & vCenter
31. Implementing Microsoft Hyper-v Private Cloud
1. Deploying & Managing Palo Alto NGFW
2. Deploying & Managing FortiGATE NGFW
3. Deploying & Managing Centralized Log & Reporter - FortiAnalyzer
4. Deploying & Managing SonicWALL Firewall
5. Deploying & Managing F5 Link Controller appliances
6. Deploying & Managing F5 VIPRION Application Delivery Control appliances
7. Deploying & Managing Juniper SRX Data Center Firewall
8. Deploying & Managing Juniper ISG & SSG Firewalls
9. Deploying & Managing Juniper NSM
10. Deploying & Managing Juniper MAG SSLVPN & UAC
11. Deploying & Managing Bluecoat ProxySG, AV & Reporter
12. Deploying & Managing Cisco ASA Firewall
13. Deploying & Managing Cisco FWSM Firewall
14. Deploying & Managing Cisco MARS Security Monitoring, Analysis and Response System
15. Deploying & Managing Cisco ACE Application Delivery
16. Deploying & Managing Cisco ACE-Module Application
17. Deploying & Managing Cisco VPN site-to-Site
18. Cisco Network Administrator
19. HP Network Administrator
20. Juniper Network Administrator
21. IP Address Management Administrator
22. Network Monitoring Administrator
• GDHA Project - General Directorate of Health Affairs Riyadh Region:
Implementation of Data Network, Wireless, Security & Voice, Network & Security
Management
• MIC Al-Kharj Project - Military Industries Corporation:
Implementation of Data Network & Security
• GACA project -General Authority of Civil Aviation:
Implementation of Data Network, Wireless & Security for 8 Domestic Airports Network Infrastructure
• KFSH Project - King Fahd Specialist Hospital:
Implementation of Data Network & Security
• Aljazirah Furniture Project:
Implementation of Data Network & Security
• Project managing complex network implementations, including Cisco PIX firewall and Cisco Intrusion Detection System installation, Cisco VPN, Layer III implementations and Juniper Routers J2350 Series.
• Continually monitor, assess and improve network security, test and implement new security technologies. Knowledge of IP traffic flow, sniffing, capturing and monitoring of live traffic streams.
• Support of WAN, Local and Remote LAN infrastructure including Dial-Up and Virtual Private Network System.
• Cisco Network Administrator
• Huawei Network Administrator
• UNIX AIX 5 Operator & UNIX Solaris 9 Operator
• Windows server 2000 Administrator
• Oracle 9i designer
Cyberoam Certified Network & Security Professional Cyberoam ID: CP250511/10010472/04224
Cisco Certified Security Professional - CCSP CISCO ID : CSCO11247933
Cisco Certified Network Associate Security (CCNA Security) CISCO ID : CSCO11247933
Cisco Certified Internetwork Expert Routing & Switching Written Exam
Cisco Certified Network Professional - CCNP CISCO ID : CSCO11247933
Exam JN0-400 JNCIA-EX : Juniper Networks Certified Internet Associate, Enterprise Switching Juniper Networks ID : JPR29917
Exam JN0-531 JNCIS-FWV : Juniper Networks Certified Internet Specialist Juniper Networks ID : JPR29917
Exam JN0-350 JNCIS-ER : Juniper Networks Certified Internet Specialist, Enterprise Routing Juniper Networks ID : JPR29917
Exam JN0-341 JNCIA-ER : Juniper Networks Certified Internet Associate, Enterprise Routing Juniper Networks ID : JPR29917
Cisco Certified Network Associate (CCNA) CISCO ID : CSCO11247933
Real Time Software Engineer (RTSE) Courses: 1608 hours 1- Software Architecture and Software Development Methodology 2- Database Theory and Real time Database 3- Object-oreinted C++ Programming 4- Object-oreinted ADA Programming and RT Design using UML 5- Real-time concept and implementation 6- Unix and Networking 7- Configuration management 8- Industrial project 1 9- ADA and Real-time Design 10- UML for Real-time Software 11- SART & Real-time Specification 12- Human Machine Interface 13- Project management - The Software work package manager 14- Unix advanced 15- Industrial project 2 16- Thesis & defence
Primergy and Prime Power Servers 1- introduction to Fujitsu Seimens Primergy serevrs 2- Installing, Configuring, and Administring Microsoft windows 2000 server 3- Introduction to Fujitsu Seimens Prime Power servers
Huawei Certified Network Engineer - HCNE
Electronics and Electrical Communication Graduation Project Computer Network and Oracle Database Project Grade: Excellent