Post Job Free
Sign in

Information Security analysis

Location:
Chicago, IL
Posted:
February 01, 2017

Contact this candidate

Resume:

AYMAN REZIQ

**** *. ****** *** ******* Ill *****

(CELL) 773-***-**** **********@*****.***

PROFESSIONALISM AND QUALIFICATIONS

OBJECTIVE

It is the primary responsibility of To make sure the information security policy provides clear direction for the information security program, the management supports your organization’s information security policy, the information security policy shows that your management is prepared to support an ongoing commitment to information security, the information security policy is consistent with business objectives and the information security policy complies with all relevant laws and regulations.

PROFILE

Exceptional: Versatile and adaptable

Superlative: Communication and team building skills

Dedicated: Hard work driven

Enthusiastic: Self-starter who can boost productivity, cut cost, foster and efficiency

Creative: That genesis of the creative process to secure environment and to do security standard.

Multi Task: Ability to manage multiple tasks in a pressured environment

DEDICATION

EDUCATION & TRAINING COURSES

2016 Started in Master’s Degree with Major Networking Security and Communication Management / information Security in Keller/DeVry Chicago IL- USA.

2006 B.Sc. Degree in Engineering Technology with Major in Computer Engineering/Computer Engineering Department from Al-Balqa' Applied University-Jordan.

COBIT 5 Foundation Control Risk Consultants - Amman 2015. - Websense WSGA Dubai 2015. - ITIL foundation V3 Amman 2015. CCNA security. Amman 2013. PCIDSS workshop. Amman 2013. IT Risk Management. Control Risk Consultants - Amman, 2011. CISA Control Risk Consultants - Amman, 2011. Control Risk Consultants Amman 2011. - Red Hat Enterprise. GENERAL COMPUTER and electronic in Amman- 2010. UNIX. General Computer and electronic in Amman- 2010.- MCSA: General Computer and electronic in Amman 2008. MCP: General Computer and electronic in Amman 2008.- CCNA Course, Al-Khwarizme in Amman 2004.

WORK EXPERIENCE

January ’10- March’16 Jordan Bank like Bank of America, Security Administrator

Monitor and manage corporate security devices and applications including Firewalls, Intruder Prevention Systems, Patch management Systems, Certificate Authority, Proxy Servers, Anti-Virus, Email Filters, Web Content Filters, Backup Devices .

- Configure, support and evaluate security tools.

- Review network designs and evaluate compliance to applicable security standards.

- Conduct security audits and provide recommendations to mitigate risks.

- Ensure compliance to security standards and policy.

- Evaluate project initiation documents.

- Design solutions, configure or support Firewalls, Content Engines, Intruder Detection or Prevention Systems.

- Configure and support anti-virus software.

- Configure and support patch management systems.

- Produce or modify disaster recovery and business continuity work practices.

- Configure and optimize server and desktop operating systems and enterprise patch management systems.

- Knowledge of common protocols such as SNMP, HTTP, HTTPS, SMTP, NTP, LDAP, KERBEROS, RADIUS and FTP.

- Ensure representation in change management working parties.

- Configure and support VPNs and enterprise gateway devices.

- Administer remote access infrastructure.

- Produce or update remote access policy.

- Define and enforce controlled access to corporate security zones as required.

- Administration Anti-virus policies and devices used for all Operating Systems

- Review all windows workstation, users, update, security patches.

- Review all Servers (AIX and Windows) operating system.

- We foxed for 3 dark area administrations, Director’s (file), applications, and events. as example:

o User IDs

o Date and time of log on and log off, and other key events

o Terminal identity

o Successful and attempts to access systems, data or applications

o Files and networks accessed

o Changes to system configurations

o Use of system utilities

o Exceptions and other security-related events, such as alarms triggered

o Activation of protection systems, such as intrusion detection systems and antimalware

- Verification - password roles and control, Ports, protocols, service

- Review all application installed.

- Document and procures used.

- License review Discussion used.

- Support the implementation of, and encourage compliance with, appropriate standards, procedures and controls for information systems

April ‘07-Jun ‘10 General Computers and Electronics, Technical support and System Admin

- Installing and repairing Windows all versions. Installing and repairing NetWare (Novell 4.5.6).Working and repairing the bank systems software (ATM System, E-banking System, check reader system, etc

- Maintenance of IBM, Dell, HP Desktop PC.

- Working with IBM servers (Netfinity and XSeries). Security and troubleshooting Duties:

- Domain System (administration and solutions).

- Novell Client Manager Solutions.

- Help Desk administration (Remotely).

March ‘06 – April ‘07 City Stars for Computers, Computer Engineer support Computer Maintenance.

- Customer Support and network configuration.

- Build, design and make solution for LAN network.

- Manage and configure the routers, all types of switches.

- Connect multi pc's together by LAN network and configure the router to make them able to browse the web page.

March ‘02 – April ‘05 Time Master Technology for Telecommunication and Computers. Jordan

- Manage and configure the routers, all types of switches.

- Connect multi pc's together by LAN network and configure the router to make them able to browse the web page.

- Connect server to another one in different region by leased line technology

- Monitor multiple security technologies, such as IDS/IPS, syslog, file integrity, vulnerability scanners.

- Follow detailed operational process and procedures to appropriately analyze, escalate, and assist in remediation of critical information security incidents.



Contact this candidate