درباره من
طراح و تحلیلگر امنیتی، معمار راه حل Voip، مشاور و مدرس سازمان های بزرگ و موسسات آموزشی.
خلاصه مسیر شغلی:
1- Managing and consulting information security projects for
organizations…Penetration tests, securing data centers, securing
connections, data protection and training information security courses.
2-Over 10 years experiences in IT field and a Microsoft certified since 2005. Designing, consulting and managing
many projects for medium and large organizations based on Microsoft
products: Windows Server
2003/2008/2012,Exchange,ISA,Forefront 2010 and System Center 2012
and Family.
3-Securing Wireless network (IEEE 802.1x authentication,EAP/TLS
,CA ,RADIUS Server) Consulting for securing organization
4- Penetration Test (BBOX ,Nessus App,BackTrack ,Acunetix
, Metasploit framework,Open Vas, Samurai)
5-Designing security for DMZ network And Hardening OS
6-Instructing the related plan for IT department
7-Implemenitng Security Solutions : IPSec,VPN L2TP,HTTPS ,Digital Certificates,…
8-Network Consultancy for Design, Support, Implementation and Troubleshooting of highly complex Cisco based networks, and Load Balancing
9-Support, maintenance, upgrades, new installations and troubleshooting on the core networks consisting of Cisco routers running OSPF, EIGRP,BGP and MPLS.
10-System/Network Trainer, Network Engineer, Network Security Engineer
11-Eepert in Unified Communication and feature projects, Voice over IP, IP Telephony, Contact Center, Collaboration & Implementation of Video Conference and Video End Point using Cisco MCU, Telepresence and … .
12-Research and assess new threats and security alerts and recommend remedial actions.
13-In depth knowledge and experience in the following security domains: Identity and Access Management; Application and Data Security; Infrastructure and Endpoint; Security Intelligence / Security Information and Event Management and Cloud based Services.
14-Review and approve new and emerging technologies and develop deployment and implementation security standards and guidelines.
15-Work with information security leadership and cross-functional teams to develop strategies and plans to enforce security requirements and address identified risks.
16-planning the delivery of solutions; answering technical and procedural questions for less experienced team members; teaching improved processes; mentoring team members.
17-Provides second- and third-level support and analysis during and after security incidents.
18-Experience in the design and deployment of technology and solutions in Identity and Access Management including governance, authentication and credentialing models; including cloud based identity services.
19- 8 years performing the installation and/or management of network-based firewalls, preferably Cisco, CheckPoint, Juniper-Netscreen or another top-tier product.
20- Analytical skills to critically evaluate the information gathered from multiple sources, reconcile conflicts, decompose high-level information into details, abstract up from low-level information to a more general understanding, distinguish presented user requests from the underlying true needs, and distinguish solution ideas from requirements.
21- Detailed understanding of information emergency and disaster recovery procedures and protocols.
22- Develop and execute a cost effective risk based enterprise network and open systems security architecture designed to meet regulatory and internal audit compliance. Design, Install and maintain a network security infrastructure comprising VPN, IDS, firewalls, vulnerability management, log management, rearchitecture of existing networks for improved accountability and segmentation, security change control, and incident response.
23- Provide network leadership for corporate, R&D, vendor access and internet web presence networks while providing functional design, architecture, and engineering . integrate network security and monitoring solutions into the overall network architecture. Provide budgetary planning, guidance and oversight for key projects. Provide audit compliance, review and remediation planning and oversight. Co-lead network integration for mergers and acquisitions for private organizations.
24- Responsible for overseeing technical and IT issues within the data center which includes server operations, management of the services and applications hosted at Data Center