Cybersecurity Architect Resume
2.00/5 (Submit Your Rating)
SUMMARY
- I have more than 15 years of experience in Network and Cyber Security domain at Confidential . I had been involved in multiple challenging Cyber Security Consulting/execution projects across the globe and have excellent understanding of issues related to project, operation as well as technical management, worked in legacy technologies as well as emerging technologies.
- My experience spans across Security architecture, Cybersecurity engineering, Risk and Compliance assessments, development of Information Security Strategy and Roadmap, Implementation of Security Controls, development of Policies and Procedures etc. I am also possesses experience IT security operations, design, configuration, and implementation of various security solutions protecting information systems.
- In my career, I had handled multiple giant International Customers of different verticals like Manufacturing (Corning Incorporated, United States of America), SABIC, Oil and Gas (YASREF, Saudi Aramco, Sadara Chemicals), Transportations sector (Saudi Airlines, Saudi Railways), Telecommunication (Saudi Telecom, Mobily), Education (Princess Nora University), Banking sectors (Riyadh Bank, Al Rajhi Bank), Abunayyan etc. at Kingdom of Saudi Arabia. in my career which enrich my experience as well as provide me a tremendous exposer in technology as well as management capabilities.
- Currently I am totally dedicated in Cyber Security Consultancy on emerging technologies as well as Technical Project Delivery Management for various customers.
PROFESSIONAL EXPERIENCE
Confidential
Cybersecurity Architect
Responsibilities:
- Responsible for Network and Cyber Security Operation - Service Delivery Manager for Customer.
- Managing security operations as well as security governance, risk, and compliance.
- Develop, implement and monitor a strategic, comprehensive enterprise security program.
- Develop security objectives and ongoing performance monitoring & reporting
- Establish and maintain relationships with range of internal/external stakeholders
- Establish and maintain an Audit program to meet compliance requirements based on ISO 27001, COBIT, PCI-DSS.
- Establish and maintain a Security Incident Management program. Driving Major Security incidents through Incident Management Process.
- Implement security measures in line with the company’s cyber security best practices and requirements
- Prepare security Strategy, Plan and Design for the requested business need.
- Liaise with Risk Management team to ensure Business and Domain risks are identified, assessed and controls are identified.
- Identify and define Control and Enablement Objectives to deliver the required level of risk management for each domain.
- Guide the security controls design to ensure all policies and information security requirements are met, to enable the business request.
- Consulting and engineering in the development and design of security best practices and implementation of solid security principles across the organization, to meet business goals along with customer and regulatory requirements.
- Review risk assessments and audit observations to implement mitigation actions to address identified gaps and coordinate the identified mitigation actions with all relevant stakeholders
- Establish and maintain an effective Security Awareness program
- Security considerations of cloud computing during and after migration.
- Assess and report maturity of cybersecurity capabilities at regular intervals
- Responsible for Customer management to ensure Zero customer escalation as well as Customer satisfaction rating >6 out of 7
- Responsible to adhere to all ITIL processes
- Responsible for Environment health and sanitization.
- Will be responsible for team management to ensure productivity
Confidential
IT Security Governance Lead
Responsibilities:
- Followed SABSA methodology in Security Demand Management.
- Evaluate Security demands from multiple stakeholders and drive it through Enterprise Security Architect review point of view.
- Ensure Proper transitions with proper planning of the four security services’ Life Cycle (Strategy & Planning, Design, Implement, Manage & Measure)
- Maintaining IT Security Demands management portal with daily updates of the demands’ list status.
- Coordinate Change Management activities that ensure that proposed changes to any aspect of security services are controlled, monitored, and implemented with minimum impact to the security service(s) according to IT security change management processes.
- Ensuring all the schedules, timelines, milestones and reporting requirements are established so that the right information is available to the right people at the right time to ensure effective execution.
- Act as a single point of contact for security demands and changes.
- Reviewing Enterprise Security Architecture of Different Demands.
Confidential
Principal CYBER Security architect
Responsibilities:
- Gather requirements from business and understand their rationale.
- Discuss and identify security requirements needed to meet the business requirements.
- Perform risk assessments to identify the required security controls.
- Design security architecture based on the requirements and controls identified from risk assessment.
- Lead the team of Design Consultants of different Vendors.
- Lead the design for the new Data Center building including developing high level and detailed level design for the data center network to Support SAAS.
- Manage up to 25 different security technologies in YASREF Security Infrastructure.
- Co-ordinate between Customer and Different OEMs like Cisco, MacAfee, RSA, F5, Bluecoat etc. to assure industry best Practice solution designing.
- Take lead role in Cisco solution designing like Cisco ASA 5585X with Firepower service, Cisco FTD 9300, Cisco ESA, WSA, Cisco ISE, Thread Grid Advance Malware Protection.
- Worked Closely with MacAfee Solutions like Virus scan, NDLP, IPS, HIPS etc.
- Take lead role in integration between different technologies of multiple vendors.
- Responsible for proper execution of all the different technologies as per design.
- Responsible for execution of UAT.
- Handover to Operation team and Signoff
Confidential
CYBER SECUITY CONSULTANT
Responsibilities:
- Worked as a Technical Project Manager to lead this Project from frontend. Manage a team of 10 people to make this show as a grand success.
- Ensuring compliance and adherence to the company’s cyber security controls
- Operate and maintain the network and infrastructure security of solutions within the company IT infrastructure
- Execute periodic reviews of infrastructure security solutions configurations to ensure that security controls are effectively and efficiently configured
- Consultancy and Planning of entire Migration Process along with Vendors like Cisco, Palo Alto, F5, web sense etc.
- Preparation of Complete infrastructure and services Migration Plan and presented to customer VP for approval process.
- Technical Verification of Low level Design Document, Implementation plan Document and NRFU provided by OEMs.
- Verification of each device configurations submitted by Vendors.
- Frontend the phase by Phase Migration Process during downtime from Technical as well as Management perspective.
- Post Migration Troubleshooting along with team for any Security issue.
- Participate in all existing Firewall Policy Compliance verification through the Algosec Tool.