Overview
Work History
Education
Skills
Accomplishments
Work Availability
Summary
Work Preference
Quote
Languages
Timeline
Generic
Mohammad Intekhab Ahmad

Mohammad Intekhab Ahmad

Riyadh

Overview

10
10
years of professional experience

Work History

System and Cyber Security Lead

TamkeenHR
Riyadh, Riyadh
10.2019 - Current
  • Enhanced security measures by implementing access control systems and surveillance equipment.
  • Supervised event security teams, providing a safe environment for attendees while minimizing disruptions or disturbances.
  • Managed physical security systems installations, ensuring proper functionality and effectiveness in protecting assets and personnel.
  • Improved employee awareness of safety procedures through the delivery of informative presentations at regular staff meetings.
  • Managed and configured Cloud flare WAF, Falcon antivirus
    Working in different cloud environments AWS, AZURE,
    Creating IT standard Policy for the company's suitable environment
  • Performs a wide variety of installation, configuration, and upgrading of workstations, and servers
  • Participated in complete system builds, upgrades, migrations, code deployments, and patch
  • Perform website security scanning and provide critical security solutions to create a Secure website
  • System Security, Risk Management, Vulnerability Assessments, Regulatory compliance
  • Responsible for design, installation/implementation, and configuration of Profiles/ policies in Microsoft Intune

Datacenter Sr administrator

Koenig Solutions
New delhi, New delhi
02.2019 - 09.2019
  • Vulnerability Scanning
  • System Center Configuration
  • Office 365 Administrator
  • Management Skills
  • SIEM management
  • Security policies
  • Security awareness training
  • Two-factor authentication
  • Penetration testing
  • Cloud security
  • Ethical hacking
  • Managed and configured Cloudflare WAF, Falcon antivirus
  • Working in different cloud environment AWS, AZURE, configure VMs network WAF cloud and Firewall
  • Creating IT standard Policy for company suitable environment
  • Performs a wide variety of installation, configuration, and upgrading of workstations, and servers
  • Participated in complete system builds, upgrades, migrations, code deployments, and patch management
  • Perform website security scanning and provide critical security solution to create a Secure website
  • System Security, Risk Management, Vulnerability Assessments, Regulatory compliance
  • Tools used for Vulnerability Assessment and Penetration Testing intrusion-detection, IDS/IPS, DLP, SIEM, vulnerability scanning, Web Gateway, proxy appliances and antivirus tools, SQL ninja, SQL map, Microsoft
  • Baseline Security Analyzer, Burp Suite and, Zed Attack OWASP
  • Responsible for design, installation/implementation, and configuration of Profiles/ policies in Intune
  • Deployment of other Microsoft cloud technologies such as Azure AD
  • Role Based Access controls (RBAC) assignments for different Intune roles
  • Create, edit, or delete Azure Active Directory (AAD) user/Device groups
  • Manage Subscriptions and licenses

System and Information Security Administrator

Maharah Human Resources Company
Riyadh, Riyadh
01.2016 - 01.2019
  • Optimized antivirus software deployment across all endpoints, reducing infection rates significantly over time.
  • Safeguarded sensitive data during transmission using encryption technologies like SSL/TLS for secure communication channels.
  • Contributed to a culture of security awareness by regularly sharing relevant news articles or cybersecurity tips with colleagues, fostering a proactive approach to keeping company data safe.
  • Implemented multi-factor authentication measures, adding an extra layer of security to protect company resources from unauthorized access attempts.
  • Perform vulnerability and networking scanning assessments
  • Monitor network traffic for unusual activity
  • Configure and support security tools such as firewalls, anti-virus software, patch Management systems, etc
  • Implement network security policies, application security, access control, and corporate data safeguards
  • Analyze and establish security requirements for networks
  • Conduct security audits and make policy recommendations
  • Install, configure, and troubleshoot Windows server
  • Managing Windows Domain Control (DC) infrastructure

Information security Administrator

Millennium Automation Systems Ltd
01.2015 - 12.2015
  • Determine security violations and inefficiencies by conducting periodic audits
  • Identify and solve potential and actual security problems
  • Maintain quality service by following organizational standards
  • Keep users informed by preparing performance reports and communicating system status
  • Defend systems against unauthorized access, modification, and/or destruction
  • Perform vulnerability and networking scanning assessments
  • Monitor network traffic for unusual activity
  • Configure and support security tools such as firewalls, anti-virus software, patch management systems, etc
  • Implement network security policies, application security, access control, and corporate data safeguards
  • Managing Windows Domain Control (DC) infrastructure
  • Managing Logical Volumes that include creating, growing, and removing volumes as per the business requirement
  • Deploy security updates from System Center Configuration Manager (SCCM)
  • Perform vulnerability and networking scanning assessments
  • Monitor network traffic for unusual activity
  • Configure and support security tools such as firewalls, anti-virus software, patch Management systems, etc.
  • Implement network security policies, application security, access control, and corporate data safeguards
  • Conduct security audits and make policy recommendations
  • Install, configure, and troubleshoot Windows server
  • Configure and manage Microsoft System Center Service Manager (SCSM)
  • Checking error logs on all servers regularly and fixing the problem if any
  • Managing Security Groups, Group policy administration
  • Modify and provide access permission to share resources across the projects
  • Troubleshooting the Authentication, Permission, Replication, and Group policies issues
  • Monitor system performance Maintains quality service by following organization standards
  • Configure and maintain database servers and processes, including monitoring of system health and performance, to ensure high levels of performance, availability, and security Professional
  • Perform vulnerability and networking scanning assessments
  • Monitor network traffic for unusual activity
  • Configure and support security tools such as firewalls, anti-virus software, patch Management systems, etc.
  • Implement network security policies, application security, access control, and corporate data safeguards
  • Perform vulnerability and networking scanning assessments
  • Monitor network traffic for unusual activity
  • Respond to Requests for Specialized Cyber Threat Reports

Education

Bachelor of Technology - Computer Science

Subharti University
2015

Diploma of Science - Computer Science

Board Of Technical Education
Jan 2011

Higher Secondary Certifi -

cate +2 gov School, State Board-Bihar, School Certificate SSC S R Hindu High School
2010

Jan 2008, 2008

Skills

  • SIEM management
  • Security policies
  • Physical security
  • Two-factor authentication
  • Access control
  • Secure coding
  • Security architecture
  • Security awareness training
  • Penetration testing
  • Business continuity
  • Cloud computing
  • Disaster recovery planning
  • Azure proficiency
  • AWS expertise
  • Cloud automation
  • Google cloud platform
  • Storage virtualization
  • Cloud services
  • System and network security
  • Infrastructure development

Accomplishments

  • Www.linkedin.com/in/intekhabahmad16/
  • ACCOMPLISHMENTS
  • Implement Microsoft Intune admin center
  • Data center migration on-premises to NourNet datacenter
  • CloudSigma Cloud to Azure cloud migration
  • Create organization security policies
  • Configure Storage accounts in Azure
  • Crowdstrike deployment and management
  • Symantec endpoint protection deployment and Management
  • Manage multiple Clouds like AZURE, and AWS
  • LANGUAGES
  • Perform Cyber and Technical Threat Analyses
  • Produce Situational and Incident-Related Reports
  • Provide Timely and Relevant Security Reports
  • Configure and support security tools such as firewalls, anti-virus software, patch management systems, etc
  • Implement network security policies, application security, access control, and corporate data safeguards
  • Analyze and establish security requirements for your networks
  • Conduct security audits and make policy recommendations
  • Perform website security scanning and provide critical security solutions to create a Secure website
  • Provide technical security advice
  • Install the operating system, install standard software, do window troubleshooting, and Printer install
  • Support, administration, and management of Windows
  • English
  • Bilingual

Work Availability

monday
tuesday
wednesday
thursday
friday
saturday
sunday
morning
afternoon
evening
swipe to browse

Summary

High-profile System and Cybersecurity Lead with over 10 years of experience designing, implementing, and managing comprehensive security architectures for various organizations. Proven track record in vulnerability identification, risk mitigation, and compliance with industry standards and regulations. Expertise in threat intelligence, incident response, penetration testing, and profound knowledge of network protocols and security technologies. Skilled in leading crossfunctional teams and collaborating with stakeholders to develop robust security strategies aligned with business goals. Committed to fostering a culture of security awareness and continuous improvement within organizations. Eager to apply knowledge in developing a strong security posture and protecting critical assets in an exciting new role.

Work Preference

Work Type

Full TimePart Time

Work Location

On-SiteRemoteHybrid

Important To Me

Career advancementFlexible work hoursPersonal development programsPaid sick leave

Quote

You will recognize your own path when you come upon it because you will suddenly have all the energy and imagination you will ever need.
Sara Teasdale

Languages

English
Bilingual or Proficient (C2)
Hindi
Bilingual or Proficient (C2)
Arabic
Beginner (A1)

Timeline

System and Cyber Security Lead

TamkeenHR
10.2019 - Current

Datacenter Sr administrator

Koenig Solutions
02.2019 - 09.2019

System and Information Security Administrator

Maharah Human Resources Company
01.2016 - 01.2019

Information security Administrator

Millennium Automation Systems Ltd
01.2015 - 12.2015

Bachelor of Technology - Computer Science

Subharti University

Diploma of Science - Computer Science

Board Of Technical Education

Higher Secondary Certifi -

cate +2 gov School, State Board-Bihar, School Certificate SSC S R Hindu High School
Mohammad Intekhab Ahmad