طراح و تحلیلگر امنیتی، معمار راه حل Voip، مشاور و مدرس سازمان های بزرگ و موسسات آموزشی.

 

خلاصه مسیر شغلی:

1- Managing and consulting information security projects for
organizations…Penetration tests, securing data centers, securing
connections, data protection and training information security courses.

2-Over 10 years experiences in IT field and a Microsoft certified since 2005. Designing, consulting and managing
many projects for medium and large organizations based on Microsoft
products: Windows Server
2003/2008/2012,Exchange,ISA,Forefront 2010 and System Center 2012
and Family.

3-Securing Wireless network (IEEE 802.1x authentication,EAP/TLS
,CA ,RADIUS Server) Consulting for securing organization

4- Penetration Test (BBOX ,Nessus App,BackTrack ,Acunetix
, Metasploit framework,Open Vas, Samurai)

5-Designing security for DMZ network And Hardening OS
6-Instructing the related plan for IT department
7-Implemenitng Security Solutions : IPSec,VPN L2TP,HTTPS ,Digital Certificates,…
8-Network Consultancy for Design, Support, Implementation and Troubleshooting of highly complex Cisco based networks, and Load Balancing

9-Support, maintenance, upgrades, new installations and troubleshooting on the core networks consisting of Cisco routers running OSPF, EIGRP,BGP and MPLS.

10-System/Network Trainer, Network Engineer, Network Security Engineer

11-Eepert in Unified Communication and feature projects, Voice over IP, IP Telephony, Contact Center, Collaboration & Implementation of Video Conference and Video End Point using Cisco MCU, Telepresence and … .

12-Research and assess new threats and security alerts and recommend remedial actions.

13-In depth knowledge and experience in the following security domains: Identity and Access Management; Application and Data Security; Infrastructure and Endpoint; Security Intelligence / Security Information and Event Management and Cloud based Services.

14-Review and approve new and emerging technologies and develop deployment and implementation security standards and guidelines.

15-Work with information security leadership and cross-functional teams to develop strategies and plans to enforce security requirements and address identified risks.

16-planning the delivery of solutions; answering technical and procedural questions for less experienced team members; teaching improved processes; mentoring team members.

17-Provides second- and third-level support and analysis during and after security incidents.

18-Experience in the design and deployment of technology and solutions in Identity and Access Management including governance, authentication and credentialing models; including cloud based identity services.

19- 8 years performing the installation and/or management of network-based firewalls, preferably Cisco, CheckPoint, Juniper-Netscreen or another top-tier product.

20- Analytical skills to critically evaluate the information gathered from multiple sources, reconcile conflicts, decompose high-level information into details, abstract up from low-level information to a more general understanding, distinguish presented user requests from the underlying true needs, and distinguish solution ideas from requirements.

21- Detailed understanding of information emergency and disaster recovery procedures and protocols.

22- Develop and execute a cost effective risk based enterprise network and open systems security architecture designed to meet regulatory and internal audit compliance. Design, Install and maintain a network security infrastructure comprising VPN, IDS, firewalls, vulnerability management, log management, rearchitecture of existing networks for improved accountability and segmentation, security change control, and incident response.

23- Provide network leadership for corporate, R&D, vendor access and internet web presence networks while providing functional design, architecture, and engineering . integrate network security and monitoring solutions into the overall network architecture. Provide budgetary planning, guidance and oversight for key projects. Provide audit compliance, review and remediation planning and oversight. Co-lead network integration for mergers and acquisitions for private organizations.

24- Responsible for overseeing technical and IT issues within the data center which includes server operations, management of the services and applications hosted at Data Center