Post Job Free

Resume

Sign in

Information Security Network Administrator

Location:
Riyadh, Saudi Arabia
Posted:
August 10, 2023

Contact this candidate

Resume:

CURRICULUM VITAE

Personal Information

First name: Mohammed Mobile: 009***********

Surname : Hamid Nationality: Sudanese

Gender : Male E-mail: adyukj@r.postjobfree.com

Address: Saudi - Riyadh

Academic Qualifications:

2012 M.Sc. in Telecommunication Engineering

Sudan University of Sciences and Technology, Sudan

2007 B.Sc. Honors, in Electronic Engineering.

Sudan University of Sciences and Technology, Sudan

Certificate and Training

2022 Splunk Core User

Inforsectraining institute

2022 Cisco Cyberops associate certified

2021 Cisco DEVNET Associate

Cisco academy

2023 PCNSE Network Security Engineer – (Palo Alto)

Inforsectraining institute

EXPERIENCE

Aiuken,Riyadbank, Riyadh

SOC Engineer

Jun 2022- PRESENT

oNetwork Security:SIEM, SOAR (Splunk, IBM QRadar SOAR, FireEye(NX- AX-HX)) technologies.

oFirewall rules, UTM, IPS/IDS, WAF, Proxy, eMail Security, Endpoint security (Paloalto, McAfee EDR, Forcepoint, SourceFire, F5 WAF, Cisco MGW, Cofense, Nexthink, DDos, CMS, MCAfee AV).

oThreat Intelligence platform (Anomali Threat Intelligence, Darktrace, Thor, SWIFT ISACA, recorded Future)

oThreat Detection, and Malware analysis/ Reverse engineering (Flare,Wireshark, pestudio, MobSF, IDA,dnspy).

oPenetration testing vulnerability assessment (Acunetix, Qualys, Burp suite, Metasploit, Nessus, Wireshark).

oDigital Forensics Investigation (Encase – Cellebrite –Autopsy – FTK –SANS SIFT - Volatility).

oOSINT Framework (Maltego, Mitaka, Spyse, OSINT Framework, Social media).

oDeveloped, maintained, and troubleshot various security elements in a Linux, UNIX, and Windows environment.

CCC by STC

April 2014 up to date

Soc analyst

oMonitoring and review escalated incident

oExperience with SOC ticketing systems and proven SOC process knowledge

oCreating Report and escalated to a higher Authority

oIdentify the risk and vulnerability and protect applications and data.

oCreate security awareness and manage incident response

oIntegrate data sources with SIEM solution (Linux, Windows, Antiviruses, firewalls, proxy NIDS, HIDS, Network management, vulnerability tools …etc.)

oKnowledge of ElasticSearch, LogStash, and Kibana (ELK)

oWorking with cross domains - IP owners, Systems and SOC design teams to achieve performance

oKnowledge in eCIR topics .

oKnowledge in using SIEM tools such as Splunk, LogRhythm, QRadar,

oAnalyze suspicious Activity

oMake sure for managing security triad and security best practice

oMalware Analysis and incident response

oIdentify Gap Analysis and provide good recommendation

oPerforming Gap assessment on playbook level

FBS financial and banking systems

Network Engineer

March 2012 – September 2018

●Deployment, and configuration of firewall.

● Monitoring/Alerting system deployment and configuration, Ethical Hacking

●Windows Server support and administration both 2003 and 2008)

●. VMware ®vSphere environment management and administration tools

● Linux support and administration, SAN configuration and administration

● Internet/TCIP/IP, DNS/E-mail/communication issues

Sudanese transmission company

Control & Telecom Engineer

March 2012 – September 2018

●Visit sites and make preventive maintenance, SDH Optical Fiber

●Monitoring telecom system fiber, RTU, Install and maintains BTS

●Mange servers and applications

COMPUTER SKILLS

●Cyber security

●Network Security

●Network Administrator

●Firewall implementation

●Web filtering

●Information Security

●Penetration testing

●Risk assessment

●SQL Server 2000

●Cloud Native,Docker, kubernetes,

Solid experience

1-Information Security,

Implementing information security policy and procedure, Work with ISO 27001 standard for Information security management system (ISMS).

1-Fortinet firewall and web filtering implementation to secure the network within the organization, IPS and web filtering.

2-Network administrator to manage and configure the network

3-Penetration testing to check and discover the weakness for all organization system

4-Risk assessment to assessments the risk and vulnerabilities for all the organization.



Contact this candidate