Preview

Student and I'M Looking for Some Help

Satisfactory Essays
Open Document
Open Document
1079 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Student and I'M Looking for Some Help
Abdulmajid A. Batis, ITIL v3
IT Risk Assessment Specialist. at Alinma Bank abdulmajid-1@hotmail.com

Summary
Highly skilled to work in IT Risk Management as IT Risk assessment specialist, manage vulnerability assessment and compliance to discover the vulnerabilities and make sure the platforms under PCI standard on internal and external applications on environment and high experience to solve it with best solutions to achieve PCI-DSS. Vulnerability Assessment plan: -Symantec CCS-VM. -Nessus. -Ripd7 Nexpose. Test Compliance: -Symantec CCS compliance Penetration Test plan: -Ripd7 Metasploit. -Backtrack 5 r3 and Kali Linux. -PT website code Netsparker 2.x Monitoring and Tracing: -HP arcsight -Symantec SIM File Integrity monitoring: -nCircal -Symantec CSP Highly skilled to manage Security and Network projects and take appropriate decisions throughout project lifecycle according PMI standard. Experienced in development and integration for IT network and security solutions. Excellent experience in Cisco, Fortinet, Juniper technologies. Adopting an innovative and analytical approach to technical troubleshooting and issue resolution. Has the ability to motivate and lead high performing teams to overachieve targets. Training courses: IT: - ITIL Foundation Certificate in IT Service Management V3 Security: - ComTIA Security+.

Page1

- (FCNSA) FortiNet - FortiGate Multi-Threat Security Systems I (201). - (FCNSP) FortiNet - FortiGate Multi-Threat Security Systems II (301). - (CJSA) Juniper SSL VPN beginner. - (AJSA) Juniper SSL VPN advanced. - (CSR) Sustainability and Corporate Social Responsibility. - Semantec Data Loss Prevention (DLP) 11 Administrator. - Symantec Control Compliance Suite & Vulnerability Manager (CCS) 11 Administrator. Cloud and Virtualization: - Microsoft Azure and Cloud Computing Technology . - Microsoft Virtualization Technology Hyper-v. - Microsoft Server 2008.

Experience
IT Risk Management. at Alinma Bank May 2012 - Present (1 year 3

You May Also Find These Documents Helpful

  • Best Essays

    Aircraft Solutions

    • 2805 Words
    • 12 Pages

    References: AlgoSec. (2012, january). AlgoSec Security Management Suite. Retrieved February 18, 2013, from Algosec.com: http://www.algosec.com/en/products/products_overview…

    • 2805 Words
    • 12 Pages
    Best Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Better Essays

    In today’s computing world, threats come in many different forms. Business and organizations are bombarded with electronic threats every second. Denial of service (DOS), network disruptions, and stealing of confidential information not only hurt businesses, but also hurt customers. With identity theft so prevalent, a business owes its customers the highest level of security possible. Many mechanisms are available protect critical infrastructure and information.…

    • 890 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment

    • 4104 Words
    • 17 Pages

    However, there is growing interest in protocols and other mechanisms for use with novel telecommunications services. Next-generation value-added services are bound to introduce new vulnerabilities. The interaction between all these communications and security protocols, and the mechanisms used for distributed systems security, is fertile ground for both interesting research. Ways to enhance these protection tools to make sure our technology is safe from IT attacks are evolving all the time. The systems or measures used to protect a company system at present might not be of any use in the future as technology is always enhancing to higher levels. Telecommunication businesses tend to be comparatively adept at managing information security risks. And many are taking action to achieve an enhanced level of ongoing insight and intelligence into ecosystem vulnerabilities and dynamic threats. Companies like Celcom must be ready to invest in this expensive research so as to be able to aggressively compete in the intense telecommunication market and to be able to sustain itself in this industry. Today, information security is a discipline that demands advanced technologies and processes, a skill set based on counterintelligence techniques, and the unwavering support of top executives. As telecom operators become more similar to technology companies, they will face a raft of new challenges. Core practices like employee awareness and training, policies and tools to reduce insider risks, and protection of data, including intellectual property, will need to be updated. The confluence of mobility, cloud, and social networking have multiplied risks, yet few operators have addressed these threats or deployed technologies that monitor user and network activity to provide insight into ecosystem vulnerabilities and threats. These…

    • 4104 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    ISS Information Systems Information NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 5…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    NT2580 Introduction to Information Security Unit 2 Application of Security Countermeasures to Mitigate Malicious Attacks © ITT Educational Services, Inc. All rights reserved. Learning Objective Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure. NT2580…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    By obtaining a Master degree I wish to obtain a job in the field. I dream to be part of Intel, IBM, Hewlett Packard in which I can demonstrate my knowledge and skills in application of software and business system analysis. Speaking to Ms. Anna Carlin an alumni from Cal Poly Pomona who graduated in 1984 with a Bachelor of Science in Business Administration, Computer Information’s System and a Master’s of Science in Business Administration, Information Systems Audit in 1992. She currently is a professor at California State Polytechnic University, Pomona previously she was a Consultant at Vanguard Enterprise Security, Business Readiness Manager at Digital Graphics Advantage, Consultant at American Savings Bank (now Washington Mutual), Northern Regional Ad Support Manager at Los Angeles Times, and Western Regional IS Audit Manager at Times Mirror. Ms. Anna Carlin teaches CIS 100 Personal Cyber Wellness, CIS 310 Management Information Systems, CIS 433 Information Systems Auditing, CIS 471 Internet Security, CIS 481 Computer Forensics, GBA577 Advanced IS Audit, GBA578 Security and Privacy of Information Systems. Professor Carlin said she decided to take a career path that would lead her to cyber security and forensics. Professor Carlin has research Interests: IT Audit, Cyber Security, Information Assurance. I look up to Ms. Anna Carlin because she is a perfect role model of…

    • 738 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    A proposal for improving IDI’s computer network infrastructure is the purpose for this proposal. This project is intended to be used by IDI’s information security team to developing a plan to improve IDI’s computer network infrastructure at multiple locations.…

    • 1206 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Cyber-security demands are ever increasing in the field of Information Technology with the globalization of the internet. Disruptions due to cyber-attacks are affecting the economy, costing companies billions of dollars each year in lost revenue. To counter this problem corporations are spending more and more on infrastructure and investing to secure the cyber security vulnerabilities which range anywhere from software to hardware to networks and people that use them. Due to the complexity of information systems that interact with each other and their counter parts, the requirement to meet specific cyber security compliances have become a challenging issues for security professionals worldwide. To help with these issues, security professionals have created different standards and frameworks over the years for addressing this growing concern of vulnerabilities within enterprise systems and the critical information they hold (“Critical Security Controls,” n.d.).…

    • 3199 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    appropriate to manage these risks. IT managers then present this information to the senior management.…

    • 789 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    The movie Inherit the Wind gave an ample, in depth view as to what the Scopes Trial was all about. The film uses information about the trial and the law it was about, but most times misconstrues that information. The film does give a great perspective as to what the actual trial was all about, but it is not very factual. The movie portrays some in a positive way and others in a negative way, but overall the movie Inherit the Wind get its point across about the Scopes Trial while being extremely inaccurate.…

    • 2048 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Bibliography: U.S. Department of Homeland Security. (n.d.). Cyber-Security. Retrieved from Department of Homeland Security: http://www.dhs.gov/cybersecurity…

    • 1965 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Vpn Solutions

    • 571 Words
    • 3 Pages

    Van der Horst, Jasper. " VPN Implementation: Questions to Ask and Points to Consider - Safe Passage | Roundup | PCMag.com." Technology Product Reviews, News, Prices & Downloads | PCMag.com | PC Magazine. N.p., 25 Sept. 2001. Web. 20 Apr. 2013. <http://www.pcmag.com/article2/0,2817,5442,00.asp>.…

    • 571 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Sdl Series

    • 2896 Words
    • 12 Pages

    Article #3: The Microsoft Security Org Chart Article #5: Microsoft Security Toolbox Article #6: Microsoft’s Security Response Article #7: Evolution of the Microsoft SDL Article #8: Microsoft SDL Investigation: The Wrap Up…

    • 2896 Words
    • 12 Pages
    Powerful Essays