Work Experience

 A. WORK EXPERIENCE


Experience #1
Designation
Quality Assurance Manager
Company Name
Alfaisal University, Jeddah Branch
Duration
02/2019 – present

with the following job roles and responsibilities:
1.      Supervising the implementation of quality culture dissemination programs at the college level.
2.      Supervising the application of quality systems and programs and evaluating the performance at the college.
3.      Development of policies in collaboration with programs and academic departments for communication and interaction with employers and the unit.
4.      Supervising the preparation and implementation of strategic plans, improvement plans and implementation plans for the college and its scientific departments.
5.      Supervising the implementation of quality and academic accreditation projects at the college.
6.      Revision of specifications, course files, and reports of courses and programs, and self-studies for academic programs at the college; and preparation of revision reports.
7.      Continuously improve the unit plans and systems, through reviews, streamlining and modernizing of unit functions, policies, regulations and their supporting procedures.
8.      Preparation, implementation and analysis of questionnaires for measuring the views of students, faculty members about the educational process and academic activities at the college.
9.     Preparation of periodic reports about the activities of quality and development, performance levels and beneficiaries satisfaction at the college.

Experience #2
Designation
Information Technology, Assistant Professor (full-time)
Company Name
Alfaisal University, Jeddah Branch
Duration
11/2016 – present

with the following job roles and responsibilities:

1.      Teach, manage, and asses university subjects and instructions to undergraduate and postgraduate students at various levels within the program areas; subjects include: Introduction to Computing, Management Information System, Database System, System Structure, eBusiness, eCommerce, eMarketing, Computer Networks, Project Management in IT, Business Analysis and Modelling, Research Method.
2.      Conduct research in information system and security and publish findings in scholarly journals (see publication section at the end of the document).
3.      Supervise master student research and undergraduate co-op training.
4.      Prepare and deliver materials with effective presentation skills, both theoretical and practical to students using a systematic plan and conduct laboratory hands-on, case studies, and project discussion groups.
5.      Serve on faculty committees to develop curriculum planning, course syllabi, course materials, and degree requirements as per accreditation and international standards.
6.      Prepare, administer and grade examinations, laboratory assignments and reports for student progress assessments with use of eLearning System.
7.      Document and develop course specification and report in a standard format to be examined by the higher education ministry.
8.      Prepare documents that mapping course assessments with the course and program Learning Outcomes (LO).
9.      Prepare student assessment evaluation report with regards to the course and program Learning Outcomes (LO).
10.  Advise students on the course and academic matters and career decisions and direct research programs of graduate students and advise on research matters.
11.  Supervise independent or group projects, laboratory work or hands-on training in Microsoft Project Management, UML business analyst modelling, E-commerce application and website, Online marketing, and web HTML design.
12.  Provide consultation services for enhancement in IT department and offered technical assistance to solve IT and business related problems (e.g. GoogleApps education solution).
13.  Provide professional consultative services to governmental sectors and provide them advice on information systems security.

Experience #3
Designation
Information Technology, Lecturer (full-time)
Company Name
Alfaisal University, Jeddah branch
Duration
02/2008 – 06/2013 (five years)

with the following job roles and responsibilities:

1.      Teach, manage, and asses university subjects and instructions to undergraduate students at various levels within the program areas; subjects include: Information security, Introduction to Computing, Management Information System, Database System, System Structure, eBusiness, eCommerce, eMarketing, Computer Networks, Project Management in IT, and Business Analysis and Modelling.
2.      Conduct research in information system and security and publish findings in scholarly journals (see publication section at the end of the document).
3.      Supervise undergraduate co-op training students.
4.      Prepare and deliver materials with effective presentation skills, both theoretical and practical to students using a systematic plan and conduct laboratory hands-on, case studies, and project discussion groups.
5.      Serve on faculty committees to develop curriculum planning, course materials, and degree requirements as per accreditation and international standards.
6.      Prepare, administer and grade examinations, laboratory assignments and reports for student progress assessments with use of eLearning System.
7.      Document and develop course specification and report in a standard format to be examined by the higher education ministry.
8.      Prepare documents that mapping course assessments with the course and program Learning Outcomes (LO).
9.      Prepare student assessment evaluation report with regards to the course and program Learning Outcomes (LO).
10.  Advise students on the course and academic matters and career decisions and direct research programs of graduate students and advise on research matters.
11.  Provide end-user device security awareness as well as troubleshooting computer hardware/software in a laboratory.
12.  Supervise independent or group projects, laboratory work or hands-on training in Microsoft Project Management, UML business analyst modelling, E-commerce application and website, Online marketing, and web HTML design.
13.  Provide consultation services for enhancement in IT department and offered technical assistance to solve IT and business related problems (e.g. GoogleApps education solution).
14.  Provide professional consultative services to governmental sectors and provide them advice on information systems security.
15.  Develop policies and procedures throughout the software development lifecycle to maximize the efficiency, effectiveness and overall quality of software products and information systems.
16.  Act as Information Technology director on behalf.

Experience #4
Designation
Cyber Security, Lecturer (part-time)
Company Name
Effat University - Jeddah, Kingdom of Saudi Arabia
Duration
09/2015 - 01/2016

with the following job roles and responsibilities

1.      Teach one or more university subjects to undergraduate; subjects include: Information security and policy, Cybercrime and cyber Warfare.
2.      Prepare and deliver lectures to students using a systematic plan with using Blackboard eLearning; and conduct laboratory hands-on, case studies, and project discussion groups.
3.      Prepare documents that mapping course assessments with the course and program Learning Outcomes (LO).
4.      Prepare a student assessment evaluation report with regards to the course and program Learning Outcomes (LO).
5.      Develop information security policies to avoid being a victim of cybercrime
6.      Present all type of Threats, cybercrime and warfare that facing any organization besides Malware (virus, worms, Trojan).
7.      Demonstrate tools for scanning and sniffing systems and networks to perform hijacking types, spoofing and poisoning types, system hacking, password cracking, wireless scanning.
8.      Evaluate existing Security solutions by testing them against existing attack-known traffic
9.      Provide end-user device security awareness as well as troubleshooting computer hardware/software in a laboratory.

Experience #5
Designation
Cyber Security/ Information/Network Security Trainer
Company Name
Alfaisal University, Jeddah branch
Duration
01/2012- 06/2013 (1 and half year)

with the following job roles and responsibilities:
1.      Provide training in Information Security and Computer Ethical Hacking to the audience from governmental military organizations.
2.      Develop policies, procedures and contingency plans using ISO standards to minimize the effects of security breaches.
3.      Provide required consulting services for enhancement in information security applications
4.      Analyze, evaluate and monitor IT infrastructure to ensure networks and applications are configured for performance enhancement and operate at high availability.
5.      Troubleshoot and configure computer hacking software tools in a computer lab with Virtual Machine VMware in Linux system.
6.      Demonstrate Cyberoam firewall configurations and troubleshooting.
7.      Demonstrate cryptography tools for data encryption such as TrueCrypt.
8.      Demonstrate tools for scanning and sniffing systems and networks (e.g. Wireshark) to perform hijacking types, spoofing and poisoning types, system hacking, password cracking, wireless scanning.
9.      Demonstrate social engineering, DoS, Phishing and spamming attacks in various tools.
10.  Demonstrate the latest technologies for digital forensics including collecting data, analyzing data, and reporting.

Experience #6
Designation
Network Administrator and Web Developer (full-time)
Company Name
Hamasaat Company for Audio and Video Production
Duration
09/2006 - 02/2008

with the following job roles and responsibilities
1.      Manage Microsoft Windows Server 2008 Active Directory infrastructure of the company.
2.      Develop the website with integrating SQL database into PHP language.
3.      Analyze, evaluate, and monitor IT infrastructure to ensure networks are configured properly to performance enhancement and operate at high scalability.
4.      Prepare and maintain procedures and documentation for network inventory, and record diagnosis and resolution of network faults, enhancements and modifications to networks, and maintenance instructions.
5.      Deploy and install Antivirus for all servers & clients.
  1. Perform helpdesk for maintaining laptops & desktops hardware – software.
7.      Perform technical support for all types of network printers.
8.      Create eMarketing campaign in Adsense, Adwords, Facebook, and Youtube channels.
9.      Create and Manage file servers, documenting department and users permissions, backup and recovery.
10.  Use Team Viewer, Remote Desktop to solve any problem remotely
11.  Perform an Inventory Management of all IT assets like laptops, desktops, switches, routers, servers, printers’ screens and projectors in addition doing all purchasing procedures.



B. COURSES I AM ABLE TO TEACH

1        Fundamentals of Computer Systems
2        Information security
3        Cybercrime and cyberwarfare
4        Network Security
5        Intrusion Detection and Ethical Hacking
6        Principles of Information Systems
7        Management Information System
8        Database Management System (MS Access & SQL)
9        System Structure Analysis and Design
10    eBusiness
11    eCommerce
12    Online Marketing
13    Data Communication and Computer Networks
14    Project Management in Information Systems
15    Business Analysis and Modelling (UML)
16    Research Methods
17    Introduction to Programming
18    Cloud Computing
19    Web Technologies
20    Internet Applications

  
         C. Skills

Skill
Level
Years of Experience
Academic Teaching
Expert
More than 10 years
Training
Expert
More than 4 years
Research and Publications
Expert
More than 8 years
eLearning
Expert
More than 8 years
Computer Security Analyst and Ethical Hacking
Expert/Qualified
More than 7 years
Project Management Administrating (Microsoft Project)
Expert
More than 5 years
Network Security Tools: Firewall, Intrusion Detection System (Bro IDS), Antivirus, SSL, and VPN
Expert/Qualified
More than 7 years
Online Marketing and E-commerce Applications
Expert
More than 8 years
Google Apps
Expert
More than 5 years
Microsoft Windows Professional
Expert/Qualified
More than 8 years
Network Analysis and Monitoring (Tcpdump, Wireshark, TcpReplay, NetFlow)
Expert
More than 8 years
Business Analysis and Modeling in UML Language
Expert
More than 5 years
Information Security Policies Development
Expert
More than 2 years
Computer Programming (C++, HTML)
Medium
More than 7 years
Web Development
Expert
More than 8 years
Information Technology Management
Expert
More than 7 years
System Analysis and Maintenance (Linux, VMware)
Expert
More than 12 years
Machine Learning WEKA
Expert
More than 8 years
Team Building, Motivational Skills, Interpersonal, and Communication Skills
Expert
More than 8 years
Ability to Work Under Pressure, Decision Making & Problem Solving Skills
Expert
More than 10 years