Ahmed Sluiaman
[align=center]Ahmed Sluiaman [/align][align=center]
Almnsorah Street
Taif, Saudi Arabia[/align]
[align=left]OBJECTIVE[/align]
[align=left]To obtain an Information Systems Security position in a challenging work environment that offers me with the opportunity to contribute to your organization’s success using my varied IT skills while maximizing my abilities and gaining experience.[/align]
[align=left]PROFILE[/align]
Dynamic team player with an ability to work independently.
Adaptable to changing priorities and effective under pressure/stress.
Creative and organized problem solver
Excellent written and oral communication skills.
Excellent skills in building active partnerships with stakeholders
Familiarity with Information Security best practices.
Due Diligence and risk oriented mindset
TECHNOLOGY OVERVIEW
([Programming (C, C++, Java, Visual Basic/.NET, ASP/.Net SQL, PL/SQL
(Database(MS SQL Server , MS Access
( Web and Mail (Apache, IIS, Oprah, MS Exchange Server, MS Outlook, Lotus Notes
(Office Tools (MS Visio 2010, MS Project 2010, MS Office 2010
(O.S ( UNIX , Linux ,Solaris , MS Windows 2008, 2003, XPS3, Vista&7
(Networking (Build and configure Client / Server and / or Workgroup net
(Internet (TCP/IP, E-commerce server configuration in MS Windows and Linux
IS Security Vulnerability Assessment (Nessus, MBSA, LANGuard,) Firewalls (Cisco ASA, CheckPoint, Juniper, Fortinet, NetScreen, Snort) Cryptography (PKI, Digital Signatures, SSL, SSH, S/MIME) Computer Forensics (Helix, Wireshark, Volatility, FTK, Foremost, Redline,
Security Management (Enterprise Risk Management, IT Risk Assessment / Management, Information Security Awareness, Security Incident Response and handling, Disaster Recovery Planning (DRP), Business Impact Analysis (BIA), Business Continuity Planning (BCP), Privacy Impact Assessment, ITSecurity Policies and Standards
Framework (Operationally Critical Threat Asset and Vulnerability Evaluation (OCTAVE), International Standards Organization (ISO) 17799 / 27001, Control Objectives for Information Technology (COBIT), IT Infrastructure Library (ITIL), SysTrust, Fundamental Information Risk Management (FIRM), Information Risk Analysis Methodologies (IRAM), Microsoft’s Security Risk Management, Capability Maturity Model (CMM)
[Multimedia (Adobe Creative Suite, Photoshop. Adobe InDesign, Adobe Illustrator, Adobe Photoshop, Apple Final Cut
EDUCATION & PROFESSIONAL TRAINING
Master in information System Security Management
[Concordia University College of Alberta Jan 2010 -May 2012
[align=left]Bachelor of Computer Science (BCs)[/align][align=left]
[/align][align=left]Taif University 2004 – 2007[/align][align=left]
[/align]
Linux (Unix) Administrator certified
[/[align=left]Northern Alberta Institute of Technology[/align][align=left]
[/align]
[align=left]Linux (Unix) Security certified[/align][align=left]
[/align][align=left]Northern Alberta Institute of Technology[/align][align=left]
[/align]
[align=left]English as Second Language[/align][align=left]
University of Alberta
[/align]
AFFILIATIONS
. IEEE - Institute of Electrical and Electronics Engineers.
ISACA - Information Systems Audit and Control Association.
CIPS - Canada's Association of Information Technology Professionals
.
PROJECT WORK
Research Experience
Comparative Analysis of Operational Malware Dynamic Link Library (DLL) Injection Live Response vs. Memory Image. The research has been accepted by international conference computing and communication system and informatics management (ICCCSIM) 2012, Dubai.
The Study of SSDT Hook through Comparative Analysis between Live Response and Memory Image. The research has been accepted by Digital Forensics, Security and Law (ADFSL 2012) Richmond, Virginia USA
An Analysis of the Effectiveness of Black-Box Web Application Scanners in Detection of Stored XSSI Vulnerabilities. The research has been accepted by international conference computing and communication system and informatics management (ICCCSIM) 2012, Dubai.