Mudasir Wani, Vice President Information Security

Mudasir Wani

Vice President Information Security

Public Investment Fund

Location
Saudi Arabia
Education
Master's degree,
Experience
21 years, 1 Months

Share My Profile

Block User


Work Experience

Total years of experience :21 years, 1 Months

Vice President Information Security at Public Investment Fund
  • Saudi Arabia - Riyadh
  • My current job since June 2019

Strategy and Leadership for Information Security Function including;
o Established vulnerability management program
o Established processes and procedures for
information security function
o Established penetration testing and red team
program
o Established program for security awareness and
phishing campaigns
o Established security configuration review and
benchmarking program
o Established In-house attack simulation program
to verify the efficiency of implemented security
controls.
❖ Representing Information security in steering and audit committees in addition to other groups as required.
❖ Support compliance and audit team during the assessment process and work on remediation of identified gaps
❖ Develop attack simulation plan to validate the efficiency of security controls and identify gaps for remediation action with control owners
❖ Responsibilities include development and implementation of Information security program in coordination with relevant stakeholders to align with business objectives in addition to developing information security roadmap
❖ Developed comprehensive information security strategy leveraging input from internal, external and regulatory entities
❖ Managing the annual operating budget for the information security department and approving vendor invoices for Project implementations and professional services
❖ Developing Annual operating plan for information security function, defining KPI’s and initiatives enabling alignment with Information security strategy and divisional Initiatives
❖ Develop security budget including review and alignment of security projects with the security strategy
❖ Develop and oversee implementation of best security practices (industry, regulatory etc) and standards to protect valuable assets
❖ Develop procedures and standards for technology teams to align with GRC and regulatory requirements
❖ Develop and execute scenarios for phishing campaigns and reporting the results to leadership in addition to extending awareness education to phished personnel
❖ Develop scenarios for Red Teaming to measure the incident responsible capabilities and validate the effectiveness of implemented security controls.
❖ Participate in regulatory compliance assessments that reflect the current maturity of information security program
❖ Work closely with IT teams on remediation of identified information security risks
❖ Track the progress of information security program via KPI dashboards
❖ Member of change advisory board representing information security function in reviewing and approving technical changes
❖ Responsible for structuring the cybersecurity program for developing national talent in coordination with Human Capital (HR)
Highlights:
❖ Established and implemented the cyber security strategy along with Vulnerability management, offensive security and governance framework, embedding regulatory requirements outlined by NCA. Developed standards, processes, and guidelines to complement the requirements for NCA compliance.
❖ Implemented benchmarking and compliance program covering Information security and regulatory requirements for cyber function.
❖ Managed and supervised continuous monitoring in line with information security mandate, providing visibility into the effectiveness of Information security program across the organization.

Lead - Cyber Defense (Information Security) at King Abdullah University of Science & Technology (KAUST)
  • Saudi Arabia - Thuwal
  • July 2009 to June 2019

Provide leadership and strategic direction for the cyber security function, ranging from planning and implementation to motivational and promotional activities highlighting the value of information security

❖ Cyber defense (SOC) Lead for 24x7X 365 managed security operation center (SOC)
❖ Leading the cyber defense center after implementation to maintain visibility into threat events at KAUST network. Responsible for creating Use cases in addition to threat hunting exercises to detect cyber-attacks targeting KAUST
❖ Supported implementation of ISO 27001 within InfoSec and ensure periodic reviews of in scope assets and documents. This involves identifying risks and evaluating security controls in terms of their effectiveness and recommend ways for improvement.
❖ Lead Penetration Testing programs. Responsibilities include defining the process right from identifying the Scope, getting approvals, to defining the configuration parameters for the test and following up with remediation actions
❖ Leading Vulnerability and Threat Management quadrant. Conduct Vulnerability Assessment for existing / new Infrastructure and Web based applications to evaluate attack vectors, identify system vulnerabilities, develop remediation plans and report metrics to management
❖ Lead incident response. Investigate potential or actual security violations or incidents in an effort to identify issues and areas that require additional security measures or process changes. This includes malware detection and supporting forensic investigations. Recommend preventive, mitigating and compensating controls to ensure appropriate level of protection
❖ Develop and maintain Cyber security incident response plan ensuring best practices are incorporated for timely detection and containment followed by remediation and eradication
❖ Develop and execute internal cyber drills to stimulate threat tactics of real threat adversary to ensure that the IT team and business stakeholders are aware of their roles and responsibilities during an actual cyber incident
❖ Implemented solutions for cyber Intelligence and forensic triage that are used to support digital forensics investigation
❖ Lead implementation of benchmark processes on existing Infrastructure at KAUST. This includes verifying the existing security posture of implemented systems and working on enhancing this posture to minimize the risk exposure and attack surface
❖ Periodic review of security systems (Firewalls, Intrusion Prevention System) to ensure policy compliance and audit rule set. Recommend corrective actions for rules that are risky and may lead to exploitation
❖ Work with IT teams for risk assessment and mitigation of identified risks
❖ Deliver security awareness training to different groups within the organization
❖ Manage the development and implementation of security policy, standards, guidelines and procedures
❖ Threat Modelling to identify relevant threats and feed them into the risk register
❖ Evaluate new solutions to automate management of security solutions and provide real time insight into security events
Highlights:
❖ Designed and managed major migration project for perimeter setup (including network and system infrastructure) with minimal impact to business. The complexity was because of migrating the setup from one vendor to another based on the risk assessment and identified Security gaps
❖ Developed defense in depth strategy for the organization and lead implementation along with reporting metrics to senior leadership
❖ Collaborating with cross-functional teams and business leaders to provide Cybersecurity vision and define the Cybersecurity Strategy
❖ Established the Cyber defense center along with incident response, threat management and forensic capabilities
❖ Develop policy, procedures and standards for Information security function
❖ Nominated for PDP (Professional development program) by the CIO for consistently exceeding the deliverables

Senior Network and Security Engineer at OTAK International
  • United Arab Emirates - Abu Dhabi
  • November 2008 to May 2009

Lead day-to-day Network and Security operations
❖ Manage IT services / Desktop support teams and provide guidance in terms of technical and process based solutions
❖ Oversees user access process to ensure operational integrity of the system
❖ Review, recommends and oversees the installation, modification or replacement of hardware or software components and any configuration change(s) that affects security
❖ Provides technical oversight and enforcement of security directives, orders, standards, plans and procedures at server sites. Ensures system support personnel receive/maintain security awareness and training
❖ Assesses the impact on the business unit/customer caused by theft, destruction, alteration or denial of access to information and reports to senior management
❖ Provides leadership and work guidance to less experienced personnel
❖ Developed an integrated model to support the implementation of IT processes
❖ Managing software License Servers and Linux based devices
❖ Responsible for Design and Setup of branch / Site Offices. This included designing Site-Site VPN’s and remote firewall integrations
❖ Develop access control matrix and do configuration benchmarks for whole infrastructure

Highlights:
❖ Managed and supervised continuous compliance in accordance with the conditions and requirements; maintained network compliance as per security policy & directives; developed control framework for network health checks and monitoring
❖ Evaluated new technologies to support operational requirements to facilitate business requirements. Optimize implemented solutions for operational efficiency and productivity
❖ Heavily involved with the implementation of Firewall Infrastructure and integration with Proxy implementation. It was a major initiative requiring network redesign and optimization
❖ Reported network incidents to management with progress update and followed-up the actionable items with different teams until closure; managed dashboard preparation and enhanced existing reporting structure (daily, weekly, and monthly)
❖ Implemented resilient networks to maintain high availability and optimum speed

Senior Network and Security Engineer at BIOS (Business Integrators)
  • United Arab Emirates - Dubai
  • October 2007 to September 2008

Lead Vulnerability and Risk Assessment program

❖ Develop procedures and proper governance around operational capabilities
❖ Active member of information security steering committee
❖ Conduct risk assessments and gap analysis for current setup to identify potential areas for improvement and recommend mitigation controls to mitigate findings
❖ Work on cross functional OLA/RACI to define touch points within and outside IT
❖ Enforcing benchmarking compliance across University Infrastructure
❖ Lead a team of system and network security admins to manage daily operations
❖ Lead the design and implementation of active directory security roles
❖ Involved in design and implementation of security services
❖ Configure Load balancing and Fault tolerance on multiple links
❖ Design and implement routing and switching topologies for network
❖ Configure security in the network using ASA firewall
❖ Secure routers and switches in the network and manage via cisco works
❖ Manage SunGard’s Luminis mail and resource servers including system database
Highlights:
❖ Spearheaded the implementation of IT infrastructure and student services for the aeronautical university
❖ Ensured high-level integration of IT systems development with policies and regulatory requirements.
❖ Provided architectural oversight and direction for enterprise-wide security and networking technology
❖ Identified the current legacy network, communications infrastructure, and legacy applications and leading the re-design of network to accommodate efficient remote access and access control solutions
❖ Reported high severity incidents to management with progress update and followed-up the actionable items with different teams until closure; managed dashboard preparation and enhanced existing reporting structure (daily, weekly, and monthly

Head Of IT Department at Suburban InfoTech Private Ltd
  • India - Jammu
  • January 2004 to February 2007
Database Administrator/Network Engineer at KarRox Technologies
  • India - Jammu
  • July 2002 to December 2003

Education

Master's degree,
  • at University of Leicester
  • January 2022

SANS Advanced Penetration Testing, Exploit Writing, and Ethical Hacking ❖ Computer Forensic Investigations - Windows In-Depth - SANS ❖ Advanced Computer Forensic Analysis and Incident Response- SANS ❖ Reverse Malware Engineering From SANS ❖ Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses- SANS(GDAT) ❖ Offensive security certified practitioner (OSCP) ❖ Advanced Penetration Testing, Exploit Writing, and Ethical Hacking -SANS ❖ Silent Runner Forensic Solution from Access Data ❖ Network Threat Response ❖ Advanced Threat Detection ❖ Cyber Security and incident response training (Mandiant) ❖ Leading Digital Business Transformation (LDBT)

High school or equivalent, Information Technology
  • at ADVANTECH Computer Centre
  • January 2003

:

Bachelor's degree,
  • at Kashmir University J&K Indi
  • January 2001

:

Specialties & Skills

Vulnerability Assessment
Vulnerability
Metrics
Science
ACTIVE DIRECTORY
AUTOMATE
BENCHMARKING
BUDGETING
COMPUTER HARDWARE
DATABASE ADMINISTRATION
DEC PDP
DIRECTING
ENGINEERING

Languages

English
Expert
Hindi
Expert
Urdu
Expert