Tel: +44 (0) 2079890750

Global Recruitment Experts

Access to millions of CV's and
thousands of international jobs

CV, Information Security Consultant seeking work in KSA

I am currently available for work
Serial No: 40948
(04/13/1987, male)
List top 5 skills: 
Short Bio:

Information Security professional with 8 years of diverse, progressive experience at Fortune 500 companies. Proven ability to contribute to organizational objectives and the company’s bottom line in both leadership and project management roles. Core competencies include:
1. Working with successful, remote, cross-functional teams responsible for delivering security services
2. Managing successful IT Security projects utilizing a structured project management methodology in a matrix organization.

Current location: 

Al Madinah Province, Saudi Arabia - View on map

Nationality: 

India

Preferred Sector of Employment: 

IT and Technology, Oil, Gas and Energy, Banking Insurance and Financial Services

Spoken languages: 

Arabic, english

Locations I am interested in working:

Bahrain, canada, Middle East, Oman, qatar, saudi arabia, United Arab Emirates



Professional Experience

  • Information Security Consultant – (Security Operations Center)
  • YASREF (Yanbu Aramco Sinopec Refining), Yanbu, KSA. Joint Venture of Saudi Aramco.
  • Duration: May 1, 2014 to Present.

Job responsibilities:

 

  • Oversight Implementation and deployment of RSA Security Analytics, RSA DLP (Data Loss Prevention) and RSA Archer (incident Management).
  • 24×7 monitoring of security log events from various IT platforms, included but not limited to firewalls, intrusion prevention systems, Windows servers, UNIX servers, network, and various applications.
  • Work with data owners of different business functions to ensure solutions implemented for data loss prevention does not negatively impact the business.
  • Define rule and policy in RSA DLP, RSA SA and RSA Archer as per organization’s compliance requirement and enforce IT Security Policies, Protect their Infrastructure, and effectively managing the Systems
  • Deployment of Data loss prevention across the network – Data in motion, Data in Use & data at Rest servers.
  • Network Access Control – Implementing a secure solution to identify network devices and profiling the Network devices to allow or disallow access based on the device type
  • Signature Updates Deployment on the Management Components and all the Individual IPS/IDS devices.
  • Analysis of the Network Attack, blocks, detects and regular Health Checkups in the real Environment
  • Analyzing collected security logs, managing information security incidents, perform security analysis on IT security events, and identifying unusual or suspicious behavior.
  • Investigating and analyzing virus and malware incidents.
  • Develop information security monitoring threat cases to be developed in security information and event management system.
  • Fine-tune SOC monitoring and incident management tools.
  • Perform network packet analysis.
  • Train and mentor Level 1 security monitoring analyst.
  • Review IPS/IDS signature update and coordinate applying them accordingly.
  • Recommend security incident response and remediation actions.
  • Preparing the Knowledge Transfer document of Process and Technical specifications guide for the Transition/Internal purpose
  • Ensure Smooth Transition for all the Security Applications, Preparing Team Metrics report and Project status report weekly/monthly presenting to the Management.

 

  • Security & Compliance Lead (Security & Risk Management)
  • IBM India PVT. LTD.
  • Duration: March 2011 to April 2014.

Job responsibilities:

 

  • Perform IT Control Assessments/Reviews to ensure Compliance with established policies, standards, regulations etc.
  • Consulting, Advising and Participating in design of various IT processes and controls to support compliance with policies, standards, regulatory requirements, etc.
  • Identify and evaluate business and technology risks, internal controls which mitigate risks and related opportunities for internal control improvement
  • Help establish Annual Audit Plan for core areas using risk assessment methodologies.
  • Coordinate with various departments to create remediation plans for defects found during audit.
  • Coordinate with auditors during internal & external audits.
  • Develop and deliver various trainings related to Security and Compliance.
  • Present the Account Security document to the customer and review for completeness.
  • Review Customer security policies with regard to change requests and exceptions
  • Review customer security policy change requirements and advise on the impact to delivery of implementing the requested change
  • Perform Risk and Vulnerability Assessment
  • Create/Update Security (ISeC) document based on customer inputs.
  • Conduct reviews to confirm compliance with security documents and the contract
  • Perform Security Gap Analysis, Develop and maintain applicable ISeC processes and procedures for service delivery
  • Provide a standard monthly security operations report to display the health of the customer environment
  • Manage root cause analysis for any audit findings.
  • Facilitating the designing, administration, implementation, and maintenance of the Identity and Access Management solution infrastructure
  • Facilitating the creation and maintenance of workflows for Identity and Access Management

 

 

  • Concessions Investigation Specialist (Transaction and Risk Management Services)
  • Amazon Development Centre (India) PVT. LTD.
  • Duration: September 2007 to March 2011.
  • Investigate retail and marketplace orders for suspected fraud using automated and manual tools.
  • Take appropriate action to identify and minimize the risk posed by such trends.
  • Update and maintain catalogue of current use cases and SOPs.
  • Be aware of and identifying new abusive patterns and trends among customer accounts.
  • Partner with appropriate business team to continually refine Concession Referrals process.
  • Achieve productivity and quality standards for investigations.
  • Contributes a positive team atmosphere, works cooperatively.
  • Communicate via email and telephone with external and internal customers to make informed decisions about risk.
  • Work on trouble tickets to find possible abuse and take required action.
  • Work with Policy Management Team and Marketing team to define policies for any promotional offers

 

Educational Qualification:

 

  • B.Tech (E.I.E) from Al-Habeeb College of Engineering and Technology, Jawaharlal Nehru Technological University, Hyderabad.
  • Intermediate (10+2) from Ratna Jr. College – Hyderabad.
  • 10th Grade from J. G. R High School – Hyderabad.

 

Technical Skills:

 

  • Security & Risk Management: HP Arcsight, TSIEM, RSA SA, DLP, RSA Archer
  • Identity Management: ITIM, Empower IDM, OIM, OAM
  • Audit & Compliance: SOX 404, ISO 27001, FDA, HIPAA, SAS 70, SSAE, Corp Audits
  • Operating Systems: MS Windows XP upto Server 2008, UNIX, Linux, Solaris & HMC Servers
  • Network: Cisco ASA, Juniper Firewalls, IDS, IPS, Microsoft TMG, Proxy
  • Applications: Active Directory, Microsoft Exchange Management 2008, SAP, Middleware, Oracle, WAF
  • Completed Microsoft Certified System Engineer (MCSE) training from Zoom Technologies
  • Applying knowledge of Lean & IBM GDF
  • Applying knowledge of ITIL
  • Trained on RSA Security Analytics, RSA DLP and RSA Archer

Completed Certified Information Systems Security Professional (CISSP) training from