Total des années d'expérience: 19 Années, 0 Mois
décembre 2014
A À présent
Senior Supervisor Information Security Intelligence
à Al-Rajhi Banking and Investment Corporation
Lieu :
Arabie Saoudite - Riyad
• Working with Governance team to close all Audit raised issues related to PCI.
• As a SOC Analyst, analyzing the Network/Host Level threats, investigation of daily reported events, validating if these qualify as incident. Recommendation of appropriate solution and follow till closure of incident
• Working with DDoS management service provider, follow up of incident with concern team at each level of SLA until complete mitigation of attack and closure of incident.
• Analyst level experience of SIEM solutions (ArcSight, Splunk) and NexThink.
• Network Level Risk Analysis, Security, control Management and implementation.
• Network/Application traffic Analysis, Signature and behavior based alert/traffic analysis and suggestion right control to get protection against malware, Vulnerabilities and network based threats.
• Analysis of all implemented solutions, raising incident and suggesting right solution.
• Working with Audit team for SOC and Security control audit, closing all raised audit points for security solutions.
• Working with Governance Management team to develop policy and procedure and implementation of industry standards (PCI-DSS, ISO) for SOC and Security controls solutions.
Implementation of IPS/IDS controls for network protection
• As a SOC Analyst, analyzing the Network/Host Level threats, investigation of daily reported events, validating if these qualify as incident. Recommendation of appropriate solution and follow till closure of incident
• Working with DDoS management service provider, follow up of incident with concern team at each level of SLA until complete mitigation of attack and closure of incident.
• Analyst level experience of SIEM solutions (ArcSight, Splunk) and NexThink.
• Network Level Risk Analysis, Security, control Management and implementation.
• Network/Application traffic Analysis, Signature and behavior based alert/traffic analysis and suggestion right control to get protection against malware, Vulnerabilities and network based threats.
• Analysis of all implemented solutions, raising incident and suggesting right solution.
• Working with Audit team for SOC and Security control audit, closing all raised audit points for security solutions.
• Working with Governance Management team to develop policy and procedure and implementation of industry standards (PCI-DSS, ISO) for SOC and Security controls solutions.
Implementation of IPS/IDS controls for network protection
juin 2010
A décembre 2014
Information Security Consultant
à Information Technology MAtrix
Lieu :
Arabie Saoudite - Riyad
Working as Information Security Consultant for Financial Sector in KSA
•IT Specialist in filed of security and and IT network and host level security Implementation
•IT Security Products Pre-Sale(IPS, Email Security, Malware protection)
Information Security System planning, Deployment and Management
• Intrusion Prevention System (IPS) management for the Financial Sector clients (Banking Sector).
• Intrusion detection Systems(IDS) deployment and Management
• Host Intrusion Prevention System (HIPS) management
• Vulnerability System Management using company Partner products e.g. McAfee Found Stone.
• Scanning Vulnerabilities are per PCI Compliance, and PCI standards. Evaluating and submitting reports to concern for Fix UP.
• Penetration Testing for Web Based Applications Using HP Web Inspect tool.
• Network Host Security Management Using company Partner (McAfee) Products ePolicy Orchestrator.
• Web and Email Security System Deployment and Management, like Secure Mail, McAfee Web and Email Security Products.
• Configuration of firewalls, installation deployment and Management.
• Domain Users Security Planning and Implementation.
•IT Specialist in filed of security and and IT network and host level security Implementation
•IT Security Products Pre-Sale(IPS, Email Security, Malware protection)
Information Security System planning, Deployment and Management
• Intrusion Prevention System (IPS) management for the Financial Sector clients (Banking Sector).
• Intrusion detection Systems(IDS) deployment and Management
• Host Intrusion Prevention System (HIPS) management
• Vulnerability System Management using company Partner products e.g. McAfee Found Stone.
• Scanning Vulnerabilities are per PCI Compliance, and PCI standards. Evaluating and submitting reports to concern for Fix UP.
• Penetration Testing for Web Based Applications Using HP Web Inspect tool.
• Network Host Security Management Using company Partner (McAfee) Products ePolicy Orchestrator.
• Web and Email Security System Deployment and Management, like Secure Mail, McAfee Web and Email Security Products.
• Configuration of firewalls, installation deployment and Management.
• Domain Users Security Planning and Implementation.
mars 2008
A octobre 2009
IT Specilist / Communication Tech
à ITT-EDO
Lieu :
Autre
• Supporting the Satellite communication with W6 Utel-Sat for network, configuring the IDirect net modem 5000 series, monitoring and coordination with the service provider.
• Configuration of Cisco firewalls, D-Link access point and switches in the star topology.
• Domain user’s management.
• File Server Management.
• Microsoft Exchange Email, client management and support.
• Networking and IT support, day to day assistance in fixing problems of LAN, software & hardware.
• Helpdesk administration, management and support.
• Network and Bandwidth monitoring using IMonitor.
• Internet and Network Security management using NTOP.
• Cisco Network devices Management Using CNA tool.
• Configuration of Cisco firewalls, D-Link access point and switches in the star topology.
• Domain user’s management.
• File Server Management.
• Microsoft Exchange Email, client management and support.
• Networking and IT support, day to day assistance in fixing problems of LAN, software & hardware.
• Helpdesk administration, management and support.
• Network and Bandwidth monitoring using IMonitor.
• Internet and Network Security management using NTOP.
• Cisco Network devices Management Using CNA tool.
avril 2005
A mars 2008
Infrastructure Engineer
à LMK Resources
Lieu :
Autre
• Manage sales through forecasting, account resource allocation, account strategy, and account/opportunity planning.
• Develop solution proposals encompassing all aspects of the business software applications.
• Participate in the development, presentation, deployment, and sales of a value proposition.
• Negotiate pricing and contractual agreement to close the sale.
• Identify and develop strategic alignment with key third party influencers.
• Administration of Lotus Notes & Domino
• Management of the Client Service Desk for In house and prospective and existing customers.
• Supporting more then 1000 Lotus Notes Users on thick and thin client
• Administration of Domino R 6. 5.1, R 7.0.2 and R 8 Server installing and managing updates
• Server Monitoring
• Daily Backups
• End User’s Support.
• Black Berry Server Administration
• User Management on Blackberry Server
• Client Support for Blackberry Server
• Barracuda Anti Spam firewall configuration, deployment and management
• Develop solution proposals encompassing all aspects of the business software applications.
• Participate in the development, presentation, deployment, and sales of a value proposition.
• Negotiate pricing and contractual agreement to close the sale.
• Identify and develop strategic alignment with key third party influencers.
• Administration of Lotus Notes & Domino
• Management of the Client Service Desk for In house and prospective and existing customers.
• Supporting more then 1000 Lotus Notes Users on thick and thin client
• Administration of Domino R 6. 5.1, R 7.0.2 and R 8 Server installing and managing updates
• Server Monitoring
• Daily Backups
• End User’s Support.
• Black Berry Server Administration
• User Management on Blackberry Server
• Client Support for Blackberry Server
• Barracuda Anti Spam firewall configuration, deployment and management
Partager sur Facebook
Partager sur Twitter
Partager via Email