IT & Cybersecurity Project Manager
Bait Al Mal Al Khaleeji (BMK)
Total years of experience :17 years, 6 Months
Role: − Leading development, implementing and monitoring a strategic, comprehensive enterprise information security and IT risk management program − Handling and supervising overall all IT infrastructure for 4 sisters companies − Managing overall Network and Cybersecurity Infrastructure − Supervising IT Infrastructure, System Production and Maintenance, IT support projects realization − Evaluating vendor risk, examining vendor contracts or terms of service, helping different teams around the organization understand third-party risk and data privacy issues, and more − Monitoring organization's networks for security breaches and investigating violations when they occurs − Assisting in design, implement, and maintain the organization's cyber-security plan − Developing and directing implementation of security standards and best practices for the organization − Directing the installation and use of security tools (e.g., firewalls, data encryption), to protect sensitive information − Recommending security enhancements to IT Management − Safeguarding information system assets by identifying and solving potential and actual security problems. − Seeking top management support and direction for implementing cyber security measures in the organization − Planning the wireless coverage for IP phones and the Internet Service for all the offices of the building using the same wireless hotspot points, identifying and implementing the requirements for building secured Data Center like UPS, Access Control, Network Patch Panel, cabling between various rooms, Automated Climate Control, so on − Configuring the Cyberoam & Sophos firewall with different rules & policies, and maintaining Exchange Server, File Server, Antivirus Server, Back-up Server, Veeam Backup, VMware, Solarwinds among others − Maintaining & configuring the disaster recovery site for all the branches − Creating online scheduled server archiving for select users, troubleshooting mail archiving, including synchronizing documents and rebuilding archive profiles − Determining security violations and inefficiencies by conducting periodic audits − Checking log files and replication issue at server for all the users; taking backup of critical databases/files − Working directly with the business units to facilitate risk assessment and risk management processes − Understanding and interacting with related disciplines through various top management committees to ensure the consistent application of policies and standards across all technology projects, systems and services
Information Display System)
Masters Of Business Management Specialize in Cybersecurity