تأسس الموقع عام 2006
Site was established in 2006


ديوان حلول البطالة

موقعنا والإعلام

حلول البطالة الإمارات

هل أنت مسؤول توظيف ؟

تسجيل الدخول
العودة   حلول البطالة Unemployment Solutions > قسم وظائف القطاع الخاص > السيره الذاتية وطلبات التوظيف

الملاحظات

السيره الذاتية وطلبات التوظيف نأمل من الفتيات عدم نشر إيميلاتهم

ماجستير امن معلومات (كندا)

السيره الذاتية وطلبات التوظيف

Ahmed Sluiaman Ahmed Sluiaman Almnsorah Street Taif, Saudi Arabia OBJECTIVE To obtain an Information Systems Security position in a challenging...

 
 
LinkBack أدوات الموضوع انواع عرض الموضوع
  #1 (permalink)  
قديم 28-06-2012, 09:12 AM
عضو جديد
 
تاريخ التسجيل: Jun 2012
المشاركات: 20
معدل تقييم المستوى: 26
العسيري احمد يستحق التميز
ماجستير امن معلومات (كندا)

Ahmed Sluiaman



[align=center]Ahmed Sluiaman [/align][align=center]
Almnsorah Street
Taif, Saudi Arabia[/align]

[align=left]OBJECTIVE[/align]
[align=left]To obtain an Information Systems Security position in a challenging work environment that offers me with the opportunity to contribute to your organization’s success using my varied IT skills while maximizing my abilities and gaining experience.[/align]

[align=left]PROFILE[/align]

Dynamic team player with an ability to work independently.
Adaptable to changing priorities and effective under pressure/stress.
Creative and organized problem solver
Excellent written and oral communication skills.
Excellent skills in building active partnerships with stakeholders
Familiarity with Information Security best practices.
Due Diligence and risk oriented mindset

TECHNOLOGY OVERVIEW

([Programming (C, C++, Java, Visual Basic/.NET, ASP/.Net SQL, PL/SQL

(Database(MS SQL Server , MS Access

( Web and Mail (Apache, IIS, Oprah, MS Exchange Server, MS Outlook, Lotus Notes

(Office Tools (MS Visio 2010, MS Project 2010, MS Office 2010

(O.S ( UNIX , Linux ,Solaris , MS Windows 2008, 2003, XPS3, Vista&7

(Networking (Build and configure Client / Server and / or Workgroup net

(Internet (TCP/IP, E-commerce server configuration in MS Windows and Linux

IS Security Vulnerability Assessment (Nessus, MBSA, LANGuard,) Firewalls (Cisco ASA, CheckPoint, Juniper, Fortinet, NetScreen, Snort) Cryptography (PKI, Digital Signatures, SSL, SSH, S/MIME) Computer Forensics (Helix, Wireshark, Volatility, FTK, Foremost, Redline,

Security Management (Enterprise Risk Management, IT Risk Assessment / Management, Information Security Awareness, Security Incident Response and handling, Disaster Recovery Planning (DRP), Business Impact Analysis (BIA), Business Continuity Planning (BCP), Privacy Impact Assessment, ITSecurity Policies and Standards

Framework (Operationally Critical Threat Asset and Vulnerability Evaluation (OCTAVE), International Standards Organization (ISO) 17799 / 27001, Control Objectives for Information Technology (COBIT), IT Infrastructure Library (ITIL), SysTrust, Fundamental Information Risk Management (FIRM), Information Risk Analysis Methodologies (IRAM), Microsoft’s Security Risk Management, Capability Maturity Model (CMM)
[Multimedia (Adobe Creative Suite, Photoshop. Adobe InDesign, Adobe Illustrator, Adobe Photoshop, Apple Final Cut


EDUCATION & PROFESSIONAL TRAINING

Master in information System Security Management
[Concordia University College of Alberta Jan 2010 -May 2012


[align=left]Bachelor of Computer Science (BCs)[/align][align=left]
[/align][align=left]Taif University 2004 – 2007[/align][align=left]
[/align]

Linux (Unix) Administrator certified
[/[align=left]Northern Alberta Institute of Technology[/align][align=left]
[/align]

[align=left]Linux (Unix) Security certified[/align][align=left]
[/align][align=left]Northern Alberta Institute of Technology[/align][align=left]
[/align]

[align=left]English as Second Language[/align][align=left]
University of Alberta
[/align]

AFFILIATIONS

.
IEEE - Institute of Electrical and Electronics Engineers.

ISACA - Information Systems Audit and Control Association.

CIPS - Canada's Association of Information Technology Professionals
.

PROJECT WORK

Research Experience
Comparative Analysis of Operational Malware Dynamic Link Library (DLL) Injection Live Response vs. Memory Image. The research has been accepted by international conference computing and communication system and informatics management (ICCCSIM) 2012, Dubai.


The Study of SSDT Hook through Comparative Analysis between Live Response and Memory Image. The research has been accepted by Digital Forensics, Security and Law (ADFSL 2012) Richmond, Virginia USA



An Analysis of the Effectiveness of Black-Box Web Application Scanners in Detection of Stored XSSI Vulnerabilities. The research has been accepted by international conference computing and communication system and informatics management (ICCCSIM) 2012, Dubai.

رد مع اقتباس
 

(( لا تنسى ذكر الله ))


مواضيع ذات صله السيره الذاتية وطلبات التوظيف

مواقع النشر (المفضلة) وتحتوي على WhatsApp لإرسال الموضوع إلى صديقك



تعليمات المشاركة
لا تستطيع إضافة مواضيع جديدة
لا تستطيع الرد على المواضيع
لا تستطيع إرفاق ملفات
لا تستطيع تعديل مشاركاتك

BB code is متاحة
كود [IMG] متاحة
كود HTML معطلة
Trackbacks are متاحة
Pingbacks are متاحة
Refbacks are متاحة





الساعة الآن 09:49 AM


Powered by vBulletin Version 3.8.9
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd
جميع الحقوق محفوظة لحلول البطالة

استضافة، تصميم مواقع، برمجة تطبيقات، من توب لاين