Sari Bukhari, Information Security Operations Center Manager

Sari Bukhari

Information Security Operations Center Manager

Sejel Technologies

Location
Saudi Arabia - Jeddah
Education
Bachelor's degree, Digital Forensics
Experience
16 years, 6 Months

Share My Profile

Block User


Work Experience

Total years of experience :16 years, 6 Months

Information Security Operations Center Manager at Sejel Technologies
  • Saudi Arabia - Jeddah
  • My current job since May 2018

➢ Coordinate staff and schedules to ensure continuity in incident/case management as applicable
➢ Ensure 24x7 monitoring of systems and network devices
➢ Ensure that the security monitoring policy, processes and procedures are defined and documented
➢ Provide management oversight for the identification, triage, and response of security events or incidents
➢ Manage security staff metric measurements (KPI’s)

Information Security Incident Response Manager at Bank Aljazira
  • Saudi Arabia - Jeddah
  • April 2014 to April 2018

➢ Define, Document, Implement and Maintain policies and standards required to pro-actively Detect and Respond to security incidents
➢ Manage the security incident response process and Security Operation Center
➢ Formalize and Lead Security Incident Response Team
➢ Promote Information Security awareness to support in prevention of security incidents
❖ Achievements in role:
➢ Founder of Security Incident Response Team (SIRT) ➢ Building and initiating Security Operation Center

Security Analyst at Bank albilad
  • Saudi Arabia - Riyadh
  • February 2013 to March 2014

 Manage and supervise Digital Forensics projects in the bank.
 Manage all information security applications and tools.
 Internet and E-Mail monitoring to prevent any malicious attempts.

System Analyst at Gulf General Cooperative Insurance Company
  • Saudi Arabia - Jeddah
  • December 2012 to January 2013

 Manage IT risks, ensure, and enhance the overall system’s security.
 Ensure that backups are made to avoid any risk of loss, sabotage or destruction of data.
 Ensure that IT applications are operational and able to meet the standard procedures of the company.

Administrative Assistant at TechWonders, Jeddah
  • Saudi Arabia - Jeddah
  • June 2006 to June 2011

Education

Bachelor's degree, Digital Forensics
  • at University of Portsmouth
  • June 2012

- 2009 - 2012 BSc [Honours] Digital Forensics University of Portsmouth (United Kingdom) Digital Forensics is defined as “The use of scientifically derived and proven methods toward the preservation, collection, validation, identification, analysis, interpretation, documentation and presentation of digital evidence derived from digital sources for the purpose of facilitating or furthering the reconstruction of events found to be criminal, or helping to anticipate unauthorized actions shown to be disruptive to planned operations”. Developed Ability to: - Forensically preserve computer data and prevent data alteration. - Retrieve data stored in different Medias such as Hard Drives, USB dongles, mobile phones and other storages. - Data interpretation and analysis to discover criminal activities, unauthorized actions/access, fraud attempts and unauthorized data alteration. - Investigate and track malicious e-mails, hacking, and web servers’ defacements. - Securing sensitive data in different forms and types. - Reverse engineer malicious software.

Diploma, Information Technology
  • at Multimedia University
  • June 2008

Foundation in Information Technology Multimedia University (Malaysia)

Specialties & Skills

Computer Forensics
Network Forensics
Ethical Hacking
Forensic Analysis
Information Security Management
Manage and create VPN Networks in Linux and Windows
Manage and create Squid Proxy servers
Linux/Unix servers management (web hosting, and personal use)
OpenOffice and MS Office
Recover data from common copy machines
Computer and network security (Windows / Linux)
Troubleshoot computer hardware and network analysis
Photoshop, Swish Max, CSS2
Reverse engineer gaming software to detect anti-privacy techniques
Windows servers management
Penetration testing using mobile phones
Computer Programming Languages Visual Basic, C++, Python and HTML5

Languages

Arabic
Expert
English
Expert

Training and Certifications

Certified Information System Auditor (CISA) (Certificate)
Date Attended:
August 2020
CompTIA Cybersecurity Analytics Professional (CSAP) (Certificate)
Date Attended:
August 2020
CompTIA Cybersecurity Analyst (Certificate)
Date Attended:
August 2020
Certified Data Privacy Solutions Engineer (CDPSE) (Certificate)
Date Attended:
July 2020
Certified In Risk and Information Systems Control (CRISC) (Certificate)
Date Attended:
August 2020
GIAC Certified Incident Handler - GCIH (Certificate)
Date Attended:
March 2017
EC-Council Certified Ethical Hacker - CEH (Certificate)
Date Attended:
October 2013
Valid Until:
January 2040
Certified Chief Information Security Officer - CCISO (Certificate)
Date Attended:
June 2020
Certified Information Security Manager - CISM (Certificate)
Date Attended:
June 2020
ITIL v4 - Foundation (Certificate)
Date Attended:
June 2020
Security+ (Certificate)
Date Attended:
June 2020
GIAC Certified Forensic Analyst - GCFA (Certificate)
Date Attended:
January 2018