Post Job Free

Resume

Sign in

Manager Security

Location:
Ottawa, ON, Canada
Posted:
July 29, 2013

Contact this candidate

Resume:

Mr. IMAD NASR Resume

ab9m6b@r.postjobfree.com Address: 292F Dalehurst Dr

Tel: +1-613-***-**** Ottawa-ON K2G 4E4

Willing to Relocate: YES Canada

GENERAL EXPERIENCE

IT OPERATIONS MANAGER

M1 GROUP LIBAN POST (National Postal & Logistics Services Company)

JUNE 2012 – MARCH 2013 (BEIRUT LEBANON)

NETWORK & INFORMATION SECURITY MANAGER

SECUVERSE SECOR SARL (Information Security Professional Services Company)

JUNE 2011 – MAY 2012 (BEIRUT LEBANON)

HEAD OF IT – NETWORK & INFORMATION SECURITY DEPARTMENT

ABU DHABI FUTURE ENERGY COMPANY MASDAR

FEB 2009 – FEB 2011 (ABU DHABI UNITED ARAB EMIRATES)

INFORMATION SECURITY CONSULTANT

FREELANCER CONTRACTOR

MARCH 2004 – JAN 2009 (OTTAWA ON CA)

HEAD OF IT – NETWORK & INFORMATION SECURITY DEPARTMENT

ABU DHABI GAS INDUSTRIES GASCO

SEP 2001 – FEB 2004 (ABU DHABI UNITED ARAB EMIRATES)

SENIOR NETWORK ENGINEER

B.T.C NETWORKS (INFORMATION TECHNOLOGY INTEGRATOR COMPANY)

OCT 1997 – AUG 2001 (SAUDI ARABIA)

FUNCTIONAL EXPERIENCE

HIGH LEVEL MANAGEMENT FUNCTIONS:

Oversee the development and maintenance of the IT strategic plan and oversight of IT performance.

Attend the IT steering committee meeting and present the IT operational five years business plan, annual

procurement plan, Key initiatives and get proper support and approvals.

Manage department activities, staff assignments, computer operations and data network activities for the

purpose of providing services to other divisions, outside agencies, and organizations while meeting department

objectives.

Coordinates the preparation of bid specifications for required purchases (e.g. computers, routers, software

(email, firewall, and backup) and a variety of parts, supplies, etc.) for the purpose of maintaining availability of

required items and completing jobs efficiently.

Develop and maintain proper vendor management process including service level agreements, maintenance

agreements and support agreements and monitors their services and performance

Approve and monitor major projects, IT budgets, priorities, standards, procedures, and overall IT Operations

KPIs.

Maintain and effective and strict change management system and adhere to all ITIL processes.

Communicate with internal clients to identify needs and evaluate alternative business solutions

Held regular status meetings with team. Initiates and implements improvements in all areas of IT operations.

Identifies and provides standards for gathering information for use in trend analysis (Gartner, E&Y) and reports

Information to management.

Conducts quarterly and yearly performance evaluations for all IT Operations Staff.

Develop a Disaster recovery plan\Business continuity plans and conduct yearly drills to assure service availability

and recovery.

Develop Risk management plans based on ISO27001 standard and integrate it in the Statement of applicability

SOA structure.

Coordinate all the Security audit activities with the external Audit firms and with the internal audit department.

ESSENTIAL FUNCTIONS(NETWORK & INFORMATION SECURITY)

Complete Design and Hands on installation and configuration of computer networks, physical and logical

network infrastructures (e.g. Internet Perimeters, Intranet, LAN, WAN, VPN Network,DR Network,Domain

Tree along with installation and configuration of Core/Edge Routers,L2/L3 Access layer & Backbone core

Switches, VLANS, Wireless Access Points and controllers, VOIP Gateways and IP Phones,WAN links

configuration based on MPLS,IPVPN,Framerelay,ATM clouds,ISDN,T1/E1 & lease lines .

Design and Hands on installation of computer hardware, and/or software applications (e.g. File & Print servers,

application &WEB servers, SQL Database, proxy servers, Windows operating systems and Server OS, Active

Directory Domain Controllers, Tree and Child Domains etc.)

Manage and design the server farm architecture including load balancing, clustering, storage, RAID, Backups

(incremental/Differential/Full) & Archiving plan along with recovery sites (Hot/Warm/cold) preparations and

testing.

Study, recommend and advise on the implementation of Cloud computing (SAAS, PAAS, and IAAS) and

highlights all concerns compared to private clouds and all related security issues and compliance with laws and

regulations.

Prepares written materials (e.g. procedures, drawings, budget requests, reports, memos, letters, etc.) for the

purpose of documenting activities, providing written reference and/or conveying information.

Complete design and Hands on configuration and implementation of all security devices including

Cisco/Juniper/Watch guard and Fortinet Firewalls,Gateways,Intrusion detection prevention system, base lining

all security devices,configuring all access lists,zones,DMZ,NAT,PAT,signatures updates and all other technical

functions related to those products.

Install and configure Host Anti Virus solutions,Anti Spywares,Host and network intrusion prevention systems,

NetIQ and Solar wind Security information incident & event management SIEM,Microsoft SCCM,MS

SCOM,WSUS,ISA/ITG,forefront security systems, NETIQ & Solar wind Patch Management system and Network

monitoring tools.

Configure, site to site and client to site VPN tunnels with authentication using RADIUS/Tacacs, RSA/PKI and

authorization using AD profile or SSL Gateways Built in profiles and NAC for security admission or built in SSL

appliance security baseline security checklist for admission control.

Perform an external Security Scanning pen test/ethical hacking test assessment and internal vulnerability tests

using various tools ( Nessus,NMAP, Acunetix Web scanner, Backtrack 5,GFI

languard,Netstumbler,inSSIDer,angry ip scanner, advance ip scanner,SQLrecon,Oracle security suite,wikto web

scanner,,etc)

Maintain, formalize and publish all information security standards, procedures, and guidelines, including

monitoring and reviewing compliance procedures.

Coordinates with IT team members, vendors, contractors and consultants to build and promote a security

program in compliance to industries security standards.

Conduct investigations and remediation of suspected information security incidents.

Report to senior management all actual and potential IT violation/risks and recommend appropriate solutions

to eliminate or minimize their potential effects.

Conduct awareness and welcome programs to all new comers in coordination with HR Department.

Establish information security policies and standards including SOPs (standard operating procedures), ISMS

specific policies and other ISO27K compliant security policies such as (Access control policy, Risk management

procedure, helpdesk & incident management procedure,ISMS Security Policy, InfoSec policy statement, InfoSec

end user manual etc).

Review information security policies and standards including SOPs (standard operating procedures), ISMS

specific policies and other ISO27K compliant security policies to keep it all updated as required by the ISMS.

Test some Key performance indicators KPIs for the security Departments and measure their compliance rate.

EDUCATION / TRAINING

Bachelor of Telecommunication and Electronic Engineering – Beirut Arab University – Beirut, Lebanon – 1997

Lebanese BACC2 Certificate Scientific Section Shouf National College – Lebanon – 1992

Cisco product line technical trainings

Juniper and RSA authenticators trainings

Two project management certified training

Four leadership and team work training

Mcafee Products Certified Trainings

Four Team Building certified trainings

Have Completed CISM(certified information Security Manager) training camp

Have Completed an Ethical hacking certification course

MEMBERSHIPS

Information Systems Audit and Control Association (ISACA) - Member since 2005

Lebanese Engineering Committee - Member since 1998

CERTIFICATES

Have completed Nortel Networks certified support specialist NNCSS

Have completed Nortel Network certified account specialist NNCAS

Have completed Nortel Networks certified Design specialist NNCDS

Have completed Cisco Certified Network Associate (CCNA)

Have completed Cisco Certified Network professional (CCNP)

Have completed Extreme Network certified specialist ENS

Have Completed ITIL Foundation certificate

IS STANDARDIZATION EXPERIENCE

Extensive experience in ISO 27001 Standard

Excellent experience in PCI DSS

TECHNOLOGIES EXPERIENCE

Microsoft windows products(WSUS,SCCM,SCOM, XP,AD,2K,2K3,2K8,ISA\ITG and Office Apps)

HP OV and HP change management suite Including HP Service Center, HP Change Control Management, and

HP Universal CMDB

Mcafee products (FoundStone Risk management, AV,Safeboot encryption,EPO,Foundstone)

Cisco systems product line(Firewalls PIX ASA,Routers, Switches,MARS Log Mgmt,ACS,CSM,NAC & wireless

aironet

Nortel Networks products( Passport series, Switches and Routers)

Utimaco Sofos Encryption suite & Movable media devices control applications.

RSA SID appliances and Authentications Tokens

VASCO IDK and Token series

Oracle ERP Security Suite & IDAM(Identity & Access management solution)

Web sense product (WSG,Triton and content filtering Solutions)

Solar winds & GFI products(SIEM Security information and event management systems)

Bluecoat SG proxy appliances: Deep experience in Bluecoat ProxySG appliance 6000,8000 and 800-x series

Fortinet product line(Fortigate UTMs & Appliances with IDPs including NIDS & HIDS)

Exinda Traffic Management solution, ALteon L4-L7 switches, Kaspersky Antivirus systems,,GFI LanGuard

solutions with Vulnerability management and remediation systems, AD Manager Plus, NetIQ security manager

and Policy manager.

Security Scanning & VA tools( Nessus,NMAP, Acunetix Web scanner, Backtrack 5,GFI languard,,,etc)

HOBBIES

Swimming, Following IT security updates,travelling, cars

LANGUAGES

English & Arabic – Fluent (R-W-S)



Contact this candidate