I'm looking for a challenging position in IT to carry out a wide variety of tasks for a maximize utilization of my skills, expertise into effect for short and long-term objectives that will provide excellent opportunity for continuing advancement of the organization and gain new skills Highly reliable for information security, project management technical.
Committed to promoting professional development and research to ensure innovation in information security management and problem-solving in order to add value to the organization and activities with all regulatory requirements and internal policies, procedures, guidelines and standards and ensuring local procedures.
Working on SIEM Solution about Risk Assessment, Penetration Testing, Vulnerability Assessment etc.
Reviewing the latest alerts to determine relevancy and urgency.
Creating new trouble tickets for alerts that signal an incident.
Running security vulnerability scanner and reviews vulnerability reports and incident Handling.
monitoring vulnerability and issues security on Infrastructure at organization.
Managing and monitoring security monitoring tools.
Take quick action any time of security notifications from computer emergency response team CERT.GOV.SA
Monitoring and dealing with suspicious activities and analysis for alerts that signal an incident or false positive.
Security scans on devices, systems and servers to detect vulnerability and collaborate with developers and owner to
reduce them and Handling.
Review of security authentication, access authentication and security policies.
Tracking the latest viruses, malware, and malicious or suspicious sites and taking action required.
Tracking Connection between devices and server for sure to contact or track packets to detect problems (Cisco ASDM)
Monitoring (IPs Cisco FirePOWER) for Top attackers and Decision making at the level of the firewall Cisco ASA
Tracking and Monitoring antivirus in servers and PCs it’s got last update to reduce security vulnerabilities.
vulnerability assessment, Vulnerability Scanning, Phishing Assessment, Web Application Assessment, Penetration
Testing.
Monthly and weekly reports on the results of the information security management
Awareness the staff and students about information security in general to protected and reduce risks to infrastructure
through monthly articles or emails
Working on SIEM Solution and Risk Assessment, Vulnerability Assessment. Reviewing the latest alerts to determine relevancy and urgency. Creating new trouble tickets for alerts that signal an incident. Running vulnerability scans and reviews vulnerability assessment reports. Managing and configuring security monitoring tools. Monitoring and dealing with suspicious activities. Tracking the latest viruses, malware, and malicious or suspicious sites. Analysis for alerts that signal an incident. Decision making at the level of the firewall. Directed unresolved issues to the next level.
Working on SIEM Solution and Risk Assessment, Vulnerability Assessment. Reviewing the latest alerts to determine relevancy and urgency. Creating new trouble tickets for alerts that signal an incident. Running vulnerability scans and reviews vulnerability assessment reports. Managing and configuring security monitoring tools. Monitoring and dealing with suspicious activities. Tracking the latest viruses, malware, and malicious or suspicious sites. Analysis for alerts that signal an incident. Decision making at the level of the firewall. Directed unresolved issues to the next level.