Wireshark
Passionate about establishing a committed strategy for designing and implementing cybersecurity controls and processes to meet cybersecurity regulations and business objectives. Practical experience in building and implementing security solutions in accordance with the SAMA/NCA Framework. Competent in Cybersecurity Risk Management.
#Cyber Security Risk Management:
Acting as Risk Manager, assisting the Director of the GRC Department in establishing and executing Cybersecurity Risk Dept. in terms of both risk governance and technical development to achieve organizational objectives.
#Responsibility:
- Risk Management:
- Oversee Technical Functions of Risk Management:
#Responsibility:
- Red Teaming:
- Penetration Testing and Source Code Review activities periodically:
- Vulnerability Management:
I had started the Cybersecurity operation unit, I’ve been assigned to take the lead for executing from scratch, operating, and administrating the below Cybersecurity control solutions:
- Vulnerability Management (VM).
- Privileged Access Management (PAM).
- Multi-Factor Authentication (MFA).
- Identity and Access Management (IAM).
Moreover, I was Managing a Penetration Testing and Configuration Review engagement.
I worked as an assistant to a software engineer on projects related to developing Absher system services that are provided to citizens and residents.
Risk Assessment
Gap Assessment
Change Management
Technical Expertise
Footprinting & Scanning
Vulnerability Assessment
Data Exfiltration
Python
Swift
Java
JSF Framework
Wireshark
Immunity Debugger
Burp Suite
Nmap
Nessus
DirBuster
Sqlmap
Metasploit
Xcode
PyCharm
AttackIQ
Fortify WebInspect DAST (Dynamic Application Security Testing)
Fortify SCA (Static Code Analyzer)
Archer GRC tool
Information Security Awareness.
Vulnerability Management
Multi-factor Authentication (MFA)
Managing a Penetration Testing engagement with an out-sourcing company
Privileged Access Management (PAM)
Identity and Access Management (IAM)
Data loss prevention (DLP)
Data Classification
IS2 CISSP - Certified Information Systems Security Professional.
SANS LDR514: GIAC Security Strategic Planning, Policy and Leadership.
ISACA CISA - Certified Information Systems Auditor (CISA)
PECB - ISO/IEC 27001 Lead Implementer.
NCA: CTF exercise.
Alert Triage with Trellix Malware Analysis.
NCA: VAPT - Technical Cyber Security Exercise
WAPT - eLearnSecurity Web Application Penetration Tester Course.
Qualys Vulnerability Management Detection & Response (VMDR).
Privileged access management (PAM) solution - Administration Training of One Identity Safeguard Product .
eCPPTv2 - eLearnSecurity Certified Professional Penetration Tester.
Multi-Factor Authentication solution - Administration Training of One Identity Defender Product .
Vulnerability Management - Tenable.sc Scanning and Analysis .
Vulnerability Management - Tenable.sc View Event Analysis and Reporting.
eJPT - eLearnSecurity Junior Penetration Tester
Security+.
iOS App Development Bootcamp using : AI , AR.
Cybersecurity- Future Challenge & Network Defenses.
Linux.
Google cloud : DevRel Study Jams/TOT.
Information Security Awareness.