Sari Bukhari, Information Security Operations Center Manager

Sari Bukhari

Information Security Operations Center Manager

Sejel Technologies

Lieu
Arabie Saoudite - Jeddah
Éducation
Baccalauréat, Digital Forensics
Expérience
16 years, 6 Mois

Partager Mon CV

Empêcher usager


Expériences professionnelles

Total des années d'expérience :16 years, 6 Mois

Information Security Operations Center Manager à Sejel Technologies
  • Arabie Saoudite - Jeddah
  • Je travaille ici depuis mai 2018

➢ Coordinate staff and schedules to ensure continuity in incident/case management as applicable
➢ Ensure 24x7 monitoring of systems and network devices
➢ Ensure that the security monitoring policy, processes and procedures are defined and documented
➢ Provide management oversight for the identification, triage, and response of security events or incidents
➢ Manage security staff metric measurements (KPI’s)

Information Security Incident Response Manager à Bank Aljazira
  • Arabie Saoudite - Jeddah
  • avril 2014 à avril 2018

➢ Define, Document, Implement and Maintain policies and standards required to pro-actively Detect and Respond to security incidents
➢ Manage the security incident response process and Security Operation Center
➢ Formalize and Lead Security Incident Response Team
➢ Promote Information Security awareness to support in prevention of security incidents
❖ Achievements in role:
➢ Founder of Security Incident Response Team (SIRT) ➢ Building and initiating Security Operation Center

Security Analyst à Bank albilad
  • Arabie Saoudite - Riyad
  • février 2013 à mars 2014

 Manage and supervise Digital Forensics projects in the bank.
 Manage all information security applications and tools.
 Internet and E-Mail monitoring to prevent any malicious attempts.

System Analyst à Gulf General Cooperative Insurance Company
  • Arabie Saoudite - Jeddah
  • décembre 2012 à janvier 2013

 Manage IT risks, ensure, and enhance the overall system’s security.
 Ensure that backups are made to avoid any risk of loss, sabotage or destruction of data.
 Ensure that IT applications are operational and able to meet the standard procedures of the company.

Administrative Assistant à TechWonders, Jeddah
  • Arabie Saoudite - Jeddah
  • juin 2006 à juin 2011

Éducation

Baccalauréat, Digital Forensics
  • à University of Portsmouth
  • juin 2012

- 2009 - 2012 BSc [Honours] Digital Forensics University of Portsmouth (United Kingdom) Digital Forensics is defined as “The use of scientifically derived and proven methods toward the preservation, collection, validation, identification, analysis, interpretation, documentation and presentation of digital evidence derived from digital sources for the purpose of facilitating or furthering the reconstruction of events found to be criminal, or helping to anticipate unauthorized actions shown to be disruptive to planned operations”. Developed Ability to: - Forensically preserve computer data and prevent data alteration. - Retrieve data stored in different Medias such as Hard Drives, USB dongles, mobile phones and other storages. - Data interpretation and analysis to discover criminal activities, unauthorized actions/access, fraud attempts and unauthorized data alteration. - Investigate and track malicious e-mails, hacking, and web servers’ defacements. - Securing sensitive data in different forms and types. - Reverse engineer malicious software.

Diplôme, Information Technology
  • à Multimedia University
  • juin 2008

Foundation in Information Technology Multimedia University (Malaysia)

Specialties & Skills

Computer Forensics
Network Forensics
Ethical Hacking
Forensic Analysis
Information Security Management
Manage and create VPN Networks in Linux and Windows
Manage and create Squid Proxy servers
Linux/Unix servers management (web hosting, and personal use)
OpenOffice and MS Office
Recover data from common copy machines
Computer and network security (Windows / Linux)
Troubleshoot computer hardware and network analysis
Photoshop, Swish Max, CSS2
Reverse engineer gaming software to detect anti-privacy techniques
Windows servers management
Penetration testing using mobile phones
Computer Programming Languages Visual Basic, C++, Python and HTML5

Langues

Arabe
Expert
Anglais
Expert

Formation et Diplômes

Certified Information System Auditor (CISA) (Certificat)
Date de la formation:
August 2020
CompTIA Cybersecurity Analytics Professional (CSAP) (Certificat)
Date de la formation:
August 2020
CompTIA Cybersecurity Analyst (Certificat)
Date de la formation:
August 2020
Certified Data Privacy Solutions Engineer (CDPSE) (Certificat)
Date de la formation:
July 2020
Certified In Risk and Information Systems Control (CRISC) (Certificat)
Date de la formation:
August 2020
GIAC Certified Incident Handler - GCIH (Certificat)
Date de la formation:
March 2017
EC-Council Certified Ethical Hacker - CEH (Certificat)
Date de la formation:
October 2013
Valide jusqu'à:
January 2040
Certified Chief Information Security Officer - CCISO (Certificat)
Date de la formation:
June 2020
Certified Information Security Manager - CISM (Certificat)
Date de la formation:
June 2020
ITIL v4 - Foundation (Certificat)
Date de la formation:
June 2020
Security+ (Certificat)
Date de la formation:
June 2020
GIAC Certified Forensic Analyst - GCFA (Certificat)
Date de la formation:
January 2018