CURRICULUM VITAE
Personal Information
First name: Mohammed Mobile: 009***********
Surname : Hamid Nationality: Sudanese
Gender : Male E-mail: adyukj@r.postjobfree.com
Address: Saudi - Riyadh
Academic Qualifications:
2012 M.Sc. in Telecommunication Engineering
Sudan University of Sciences and Technology, Sudan
2007 B.Sc. Honors, in Electronic Engineering.
Sudan University of Sciences and Technology, Sudan
Certificate and Training
2022 Splunk Core User
Inforsectraining institute
2022 Cisco Cyberops associate certified
2021 Cisco DEVNET Associate
Cisco academy
2023 PCNSE Network Security Engineer – (Palo Alto)
Inforsectraining institute
EXPERIENCE
Aiuken,Riyadbank, Riyadh
SOC Engineer
Jun 2022- PRESENT
oNetwork Security:SIEM, SOAR (Splunk, IBM QRadar SOAR, FireEye(NX- AX-HX)) technologies.
oFirewall rules, UTM, IPS/IDS, WAF, Proxy, eMail Security, Endpoint security (Paloalto, McAfee EDR, Forcepoint, SourceFire, F5 WAF, Cisco MGW, Cofense, Nexthink, DDos, CMS, MCAfee AV).
oThreat Intelligence platform (Anomali Threat Intelligence, Darktrace, Thor, SWIFT ISACA, recorded Future)
oThreat Detection, and Malware analysis/ Reverse engineering (Flare,Wireshark, pestudio, MobSF, IDA,dnspy).
oPenetration testing vulnerability assessment (Acunetix, Qualys, Burp suite, Metasploit, Nessus, Wireshark).
oDigital Forensics Investigation (Encase – Cellebrite –Autopsy – FTK –SANS SIFT - Volatility).
oOSINT Framework (Maltego, Mitaka, Spyse, OSINT Framework, Social media).
oDeveloped, maintained, and troubleshot various security elements in a Linux, UNIX, and Windows environment.
CCC by STC
April 2014 up to date
Soc analyst
oMonitoring and review escalated incident
oExperience with SOC ticketing systems and proven SOC process knowledge
oCreating Report and escalated to a higher Authority
oIdentify the risk and vulnerability and protect applications and data.
oCreate security awareness and manage incident response
oIntegrate data sources with SIEM solution (Linux, Windows, Antiviruses, firewalls, proxy NIDS, HIDS, Network management, vulnerability tools …etc.)
oKnowledge of ElasticSearch, LogStash, and Kibana (ELK)
oWorking with cross domains - IP owners, Systems and SOC design teams to achieve performance
oKnowledge in eCIR topics .
oKnowledge in using SIEM tools such as Splunk, LogRhythm, QRadar,
oAnalyze suspicious Activity
oMake sure for managing security triad and security best practice
oMalware Analysis and incident response
oIdentify Gap Analysis and provide good recommendation
oPerforming Gap assessment on playbook level
FBS financial and banking systems
Network Engineer
March 2012 – September 2018
●Deployment, and configuration of firewall.
● Monitoring/Alerting system deployment and configuration, Ethical Hacking
●Windows Server support and administration both 2003 and 2008)
●. VMware ®vSphere environment management and administration tools
● Linux support and administration, SAN configuration and administration
● Internet/TCIP/IP, DNS/E-mail/communication issues
Sudanese transmission company
Control & Telecom Engineer
March 2012 – September 2018
●Visit sites and make preventive maintenance, SDH Optical Fiber
●Monitoring telecom system fiber, RTU, Install and maintains BTS
●Mange servers and applications
COMPUTER SKILLS
●Cyber security
●Network Security
●Network Administrator
●Firewall implementation
●Web filtering
●Information Security
●Penetration testing
●Risk assessment
●SQL Server 2000
●Cloud Native,Docker, kubernetes,
Solid experience
1-Information Security,
Implementing information security policy and procedure, Work with ISO 27001 standard for Information security management system (ISMS).
1-Fortinet firewall and web filtering implementation to secure the network within the organization, IPS and web filtering.
2-Network administrator to manage and configure the network
3-Penetration testing to check and discover the weakness for all organization system
4-Risk assessment to assessments the risk and vulnerabilities for all the organization.