Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- As an Information Security my Major Strengths & Specialties are in the following Areas:
- 1) Information Security Management System.
- 2) Design and development of Information & Network Security Policies & Procedures
- 3) IT Governance & Best Practices
- 4) Design of Business Continuity, Disaster Recovery Processes & Procedures
- 5) IT Audit & Compliance Management
- 6) Cooperation in Information Security Management related Projects
- 7) Phishing Defense and Attack.
- 8) Advance SQL Injection
- 9) SOCIAL Engineering.
- 10) Web Application Defense and Attack.
- 11) DNS Redirecting and Spoofing.
- 12) Cryptography.
- 13) Encryption and decryption.
- 14) MITM Attacks
- 15) Cookie jacking, sniffing ,Garbing
- 16) SEO Attacks
- 17) XSS cross Site scripting
- - IT Security Incident Response, Damage Assessment and Disaster Recovery
- - Network and System Security Engineering
- - Blackbox / Whitebox Penetration Testing
- - Zero-Day Vulnerability/Malware/Trojan Investigations
- - DoS/DDoS Mitigation and Firewall/IDS/IPS Analysis
- - Forensics & Research
- - Vulnerability Assessment
- - Mobile Device Security Management
- - Fruad Management
- - Cyber Defense
- - Web sites attacks
- - Client side attacks
- - Working on Information and Telecom Security Audit for Bahrain Bourse.
- - Web Vulnerability assessment for CIBAFI.
- - Internal Network Security Audit for Reef Real Estate.
- - Web vulnerability assessment for Nuwab and Shura Council.
- - Microsoft Exchange Server 2010 server Hardening for Reef Real Estate.
- - Migration from Microsoft Directory Service 2003/MS Exchange 2003 to AD 2008/Exchange 2010.
- - Stress Test for Microsoft Exchange 2003/2007.
- - Exchange 2007/2010 Clustering.
- - Microsoft Hyper-V Implementation and Design.
- - Design and implementation of Vmware ESX Server/ Vsphere 4.
- - Design and Implementation of Windows 2008 R2 Active Directory /DNS/DHCP/Group Policies.
- - Design and Implementation of a Clustered Exchange 2010.
- - Perform on-site and remote security consulting including penetration testing, application testing, web application security assessment, on-site Internet security assessment, social engineering, wireless assessment.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement