Preview

Senior Software Configuration Management Engineer

Satisfactory Essays
Open Document
Open Document
930 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Senior Software Configuration Management Engineer
Mohamed Fathy Sakr . Mobile : +201009172783 , +201090100744.
Home : +20482599002 Address : Egypt- Cairo – Nasr City Email : Mohamedfathysaker@gmail.com Mohamedfathysaker@yahoo.com .

Objectives
To enhance my experience and increase opportunities to achieve a good position and a good work reputation in the company or the project I work in.

Personal Data  Birth of date : 01 / 06 / 1986.  Military service : Completed.  Marital status : single.  Hobbies : Reading , Playing Chess and Playing Play station games. Education
June 2011 |Now Completing the Master Degree at “Social Ecommerce” -Cairo University – Egypt June 2011 | Pre Master Degree in Computer Science from Faculty of Computers and Information systems - Cairo University – Egypt June 2007 | B.Sc. i n Computer Science from Faculty of Computer & Information science Zagazig uni versity– Egypt. Graduation Project : Network Intrusion Detection And Prevention System . Project Grade : Excellent ( 98%) . Grade : Very Good – 75.83 %

Graduation Project
Graduation project : Network Intrusion Detection And Prevention System .

 Description : A system for detecting and preventing network intrusions from Both inside and outside the network based on some predefined Signatures of attacks
 Tools and Technologies : C# .NET 2005 , WinPcap and SharpPcap

Page 1

2
Certification
    

ITIL V.3 (Attendance) ITI Certification for Visual C#.Net (Attendance) Faculty Certification for Visual C#.Net (Attendance) IBM Rational Software Architect (Attendance) IBM Rational Requisite Pro (Attendance)

Experience  From [13/02/2011 ]- To [NOW] [ ITS – International Turnkey System ] [Senior Configuration
Management Engineer ]  The Leader of the Build Automation unit and the owner of the build automation innovation in ITS  Build Engineer for Eight products at ITS {ETHIX- Investment , ETHIXCredit , ETHIX-Branch , ETHIX- Contact , ETHIX- SMS , ETHIX-POS, ETHIX-Banking Framework and ETHIX+}  The Release

You May Also Find These Documents Helpful

  • Powerful Essays

    References: 267. Beijtlich, R. (n.d.). The Practice of Network Security Monitoring: understanding incident detection and response. [Books24x7 Version.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    c) Logical IDS: Network and workstation mechanisms that monitors network traffic and provide real-time alarms for network-based attacks Service Network.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    ITNE455-1204A-01 U3GP3

    • 5030 Words
    • 21 Pages

    Bradley, Tony, (2012). Introduction to Intrusion Detections Systems (IDS). Retrieved September 5, 2012 from http://netsecurity.about.com/cs/hackertools/a/aa030504.htm…

    • 5030 Words
    • 21 Pages
    Powerful Essays
  • Better Essays

    Hardware can be used to protect the network from outside threats. Intrusion detection systems (IDS) automate detection of threats and attack through traffic analysis. Cisco’s IDS “delivers a comprehensive, pervasive security solution for combating unauthorized intrusions, malicious Internet worms, along with bandwidth and e-Business application attacks” (Cisco Systems, 2007, Cisco Intrusion Detection). They take this one-step further with an intrusion prevention systems (IPS). IPS shifts the focus on the attacker, not the attack itself, by increasing the accuracy of threat prevention through global threat analysis (Cisco Systems, 2012, Intrusion Prevention System with Global Correlation). The Cisco Adaptive Security Appliances (ASA) “combines the industry 's most deployed stateful inspection firewall with…

    • 890 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    The signature based technique is easier for deployment, since it does not need to learn the environment[5]. It is very effective against known attacks, but it cannot detect new intrusions until it is updated with the new signatures on its database.Therefore, they are easy to evade and can be easily bypassed by intruders by modifying known attack signatures and also target systems, that are not updated with new signatures that detect the modification. The architecture shown in Fig.1, uses the preprocessing to evaluate the signature and compare those signatures to the known signatures in the database. If there is a match then alert is issued, else the detection system does…

    • 111 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    The purpose and benefits are for self satisfaction and motivation, to impress your line/regional managers, for possibilities of a bonus/promotion, to improve your knowledge of certain areas which may help in the particular job role you are in and also in future jobs, to help achieve personal and mandatory goals, to help improve and maintain high and professional standards, to help secure the job you are in and to prove to people you are worthy and capable of taking on more responsibility, improving your performance may also help you to become more organized and efficient.…

    • 579 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    assignment 302 NVQ lvl 3

    • 1714 Words
    • 7 Pages

    The chance to look at what I did well or what I can do better.…

    • 1714 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    There are many purposes of helping other people work effectively and efficiently. One is to increase productivity within the work place and ensure the company will meet the maximum sales at the end of the month. It helps issues being resolved quicker and helps you gain knowledge, when you come across difficult situations, you can seek the right guidance. This helps creating a better environment for you and your work colleagues and will also improve yours and others communication skills. It will increase your ability in the work place and help you achieve more.…

    • 2285 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Software Associates

    • 1558 Words
    • 7 Pages

    Susan, I have just seen the quarterly P&L. It’s great that we exceeded our billed hours and revenue targets. But why, with higher revenues, is our bottom line less than half of what we had budgeted. Can we have a meeting tomorrow morning at 8 AM so you can explain this discrepancy to me?…

    • 1558 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    To not waste time, so you are aware what information you need and are therefore able to ask the right questions. It is also important as you will sound professional and organised, which will reflect well upon the company you work for. It may be a good idea to have a checklist written down of all you need to know, this way you won’t forget anything and you can avoid having to call back later for forgotten information. This will prove to be a much more efficient way of working and save time.…

    • 2879 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Network-based Intrusion Prevention (NIPS): monitors the entire network for suspicious traffic by analyzing protocol activity.…

    • 467 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Software Associate

    • 300 Words
    • 10 Pages

    Software Associates 1. Actual Budget Actual - Budget Revenue 3,264,000 3,231,900 32,100 Expense 2,967,610 2,625,550 342,060 Op Profit 296,390 606,350 Profit % 9.1% 18.8% Budgeted Op Profit 606,350 Revenue Var F 32,100 0840103Expense Var U (342,060) Actual Op Profit 296,390…

    • 300 Words
    • 10 Pages
    Satisfactory Essays
  • Satisfactory Essays

    PERSONAL INFORMATION Date of Birth: 02 May 1978; Marital Status: Married; Nos. of Children: ONE (Three months old) ____________________________________________________________…

    • 1383 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    Software Engineer

    • 856 Words
    • 4 Pages

    Computer software engineers use the basics and techniques of computer science, engineering, and mathematical analysis to the design, development, testing, and evaluation of the software and systems that enable computers to perform their many different tasks.…

    • 856 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    * To learn about each potential outcomes of effective functioning of the organization as well as inspiring employees towards their job.…

    • 4030 Words
    • 17 Pages
    Powerful Essays

Related Topics