Expert of security technologies and SOC programs for smart cities, ISPs, health care, telecom, financial industry and software houses. Security programs include technology, IT, software's architecture review, security operation and governance. SOC services, threat hunting, risk assessment, risk mitigation, advance persistent threat detection with protection. Expertise in security incident handling and securing organization in proactive way. Establishing effective security controls to avoids security breaches. Maintaining security certification with standards such as ISO,NIST,SAN and OWSAP standards. Documentation for security policy, processes and procedure align with organizational strategy and with cyber security framework.
To establish Gaditek SOC from stratch. The establish in house security operations team, supported by an MSSP, that manages incident response and general security operations activities covering Asia Pacific, Middle East and Europe. Responsible for providing leadership and management to an international team of analysts.Providing subject matter expertise on detection, protection and response of security events and incidents.Liaising with the operational IT teams on incident response and improvements.Reporting on key operational metrics from the team to CEO and CISO.Ensure operational processes are documented and kept up to date using feedback from incident lessons learned.Work with the gaditek 's MSSP on BAU monitoring and response activities.Ensure response capabilities are mature and tested on a regular basis.Supporting gaditek assurance activities and security certifications.
Researches, analyses, recommend and implement new technologies, standards, processes, tools and techniques for security systems. Reviews current infrastructure and security system designs to select appropriate technology and ensures efficient use of resources and integration of multiple and heterogeneous systems and technologies. Provide security assessments for networks, systems, applications, website industrial control systems reports with standards like ISO 27K, IEC 62443, OWASP, NIST standards.
Analyze the business security requirement with architectural design, development, implementation and optimization of security frameworks for business and engineering functions. Define project scope, plans and deliverables including cost projections and proposed implementation dates based on an understanding of the business’ organizational strategic direction, technical context and business needs. Develop detailed business requirements, workflow procedures, data models, system, documentation, user manuals and training materials for security systems. Communicate business requirements to management and all stakeholders using standard and clear documentation, and provide leadership, assistance and clarification during technology deployment. Review vendors security system design documentation and provide feedback and recommendations for improve. Develop business cases and cost-benefit analysis for technology enhancements or services related to security. Conduct functional evaluation and approval of new security systems or services during the tendering cycle
Work closely with the PTCL executive staff and decision makers for IP security and strategy.
• Secure identity and access management to core and access network of Etisalat Pakistan with security standards compliance. The size of the network includes more than 3K core elements and 15K access elements. Perform a security audit to minimize security incident. • Operate 8 centralize ISP DC with valid configurations change control mechanism for providing maximum uptime for services like ISP DNS, PSTN, GPON IPTV, OTT, VOD centralize authentication system for more the 30 million customers, web hosting solutions, NMS, and DPI solution for regulatory compliance.
• Study traffic trend and attack trends on hosted services with SEIM, find abnormalities based on a known and unknown pattern and identify new cases bases abnormal traffic trends. Secures website from different types of attacks hosted in DC and tracks any abnormal behaviour on admin user traffic.
• Identify, recommend, develop, implement, and support cost-effective technology security solutions, Requirement Analysis of any change/up-gradation, expansion, innovation requires in DC Topology/Design/Architecture & configuration.
• SOC programs in ISP includes venerability assessment, incident management and security recommendation.
Manage NGFW at datacenter, branches and site office with the maximum uptime. Designing expansion of the network. Analyze security events for internet banking and central banking applications. Maintain primary data centre and DR site with
Page3
disaster recovery drill. Performing the SOC monitoring activities includes signature base attack control mechanism, endpoint security control mechanism with behaviour base threat control programs. Detect advanced persistence threat and control new evolving threat.
Responsible for network security solution deployment and L2 operational support. Deploy and operate Client’s core and edge network using specified design having routing, switching and security devices. Do survey and implement POC of a different scenario. Experience of deploying more than 70 Data Centre/Mini DCs Operational Experience of more than 20 corporate clients DCs. Coordination with different teams which include Systems, DBA for deployment/Operation, a wireless team for services support.