Information Security Operations Center Manager
Sejel Technologies
Total years of experience :16 years, 6 Months
➢ Coordinate staff and schedules to ensure continuity in incident/case management as applicable
➢ Ensure 24x7 monitoring of systems and network devices
➢ Ensure that the security monitoring policy, processes and procedures are defined and documented
➢ Provide management oversight for the identification, triage, and response of security events or incidents
➢ Manage security staff metric measurements (KPI’s)
➢ Define, Document, Implement and Maintain policies and standards required to pro-actively Detect and Respond to security incidents
➢ Manage the security incident response process and Security Operation Center
➢ Formalize and Lead Security Incident Response Team
➢ Promote Information Security awareness to support in prevention of security incidents
❖ Achievements in role:
➢ Founder of Security Incident Response Team (SIRT) ➢ Building and initiating Security Operation Center
Manage and supervise Digital Forensics projects in the bank.
Manage all information security applications and tools.
Internet and E-Mail monitoring to prevent any malicious attempts.
Manage IT risks, ensure, and enhance the overall system’s security.
Ensure that backups are made to avoid any risk of loss, sabotage or destruction of data.
Ensure that IT applications are operational and able to meet the standard procedures of the company.
- 2009 - 2012 BSc [Honours] Digital Forensics University of Portsmouth (United Kingdom) Digital Forensics is defined as “The use of scientifically derived and proven methods toward the preservation, collection, validation, identification, analysis, interpretation, documentation and presentation of digital evidence derived from digital sources for the purpose of facilitating or furthering the reconstruction of events found to be criminal, or helping to anticipate unauthorized actions shown to be disruptive to planned operations”. Developed Ability to: - Forensically preserve computer data and prevent data alteration. - Retrieve data stored in different Medias such as Hard Drives, USB dongles, mobile phones and other storages. - Data interpretation and analysis to discover criminal activities, unauthorized actions/access, fraud attempts and unauthorized data alteration. - Investigate and track malicious e-mails, hacking, and web servers’ defacements. - Securing sensitive data in different forms and types. - Reverse engineer malicious software.
Foundation in Information Technology Multimedia University (Malaysia)