Work Experience

 

A.    WORK EXPERIENCE

 

Experience #1

Company Name

Alfaisal University, Jeddah Branch

Duration

02/2008 – present

 

1. Designation: Internal Auditor and Risk Manager, (01/2020 – present)

1.     Develop Internal Audit Plan based on Risk Management.

2.     Conduct Audit by verifying effectiveness of controls and issuing audit reports with nonconformities.

3.     Conducting auditing and gap analysis at the organization.

4.     Managing training session in information security fields.

2. Designation: Trainer, (01/2012 – present)

1.     Providing training in various mode: Instructor Led Training, Real Time Presentations, Interactive Classes, and Classroom.

2.     Supporting and due care of the trainees even after the course ends.

3.     Providing PECB ISO 27001, ISO 27005, ISO 31000, and ISO 22301 and cyber security courses.

4.     Provide training in Information Security and Computer Ethical Hacking to the audience from governmental military organizations.

5.     Develop policies, procedures and contingency plans using ISO 27005 standards to minimize the effects of security breaches.

6.     Provide required consulting services for enhancement in information security applications

7.     Analyze, evaluate and monitor IT infrastructure to ensure networks and applications are configured for performance enhancement and operate at high availability.

8.     Troubleshoot and configure computer hacking software tools in a computer lab with Virtual Machine VMware in Linux system.

9.     Demonstrate Cyberoam firewall configurations and troubleshooting.

10.  Demonstrate cryptography tools for data encryption such as TrueCrypt.

11.  Demonstrate tools for scanning and sniffing systems and networks (e.g. Wireshark) to perform hijacking types, spoofing and poisoning types, system hacking, password cracking, wireless scanning.

12.  Demonstrate social engineering, DoS, Phishing and spamming attacks in various tools.

13.  Demonstrate the latest technologies for digital forensics including collecting data, analyzing data, and reporting.

3. Designation: Quality Assurance Manager, (02/2019 – present)

1.     Supervising the implementation of quality culture dissemination programs at the college level.

2.     Supervising the application of quality systems and programs and evaluating the performance at the college.

3.     Development of policies in collaboration with programs and academic departments for communication and interaction with employers and the unit.

4.     Supervising the preparation and implementation of strategic plans, improvement plans and implementation plans for the college and its scientific departments.

5.     Supervising the implementation of quality and academic accreditation projects at the college.

6.     Revision of specifications, course files, and reports of courses and programs, and self-studies for academic programs at the college; and preparation of revision reports.

7.     Continuously improve the unit plans and systems, through reviews, streamlining and modernizing of unit functions, policies, regulations and their supporting procedures.

8.     Preparation, implementation and analysis of questionnaires for measuring the views of students, faculty members about the educational process and academic activities at the college.

9.     Preparation of periodic reports about the activities of quality and development, performance levels and beneficiaries satisfaction at the college.

 

4. Designation: Assistant Professor in Information Systems (11/2016 – present)

1.     Conduct research in information system and security and publish findings in scholarly journals (see publication section at the end of the document).

2.     Teach, manage, and asses university subjects and instructions to undergraduate and postgraduate students at various levels within the program areas; subjects include: Introduction to Computing, Cybersecurity courses, Management Information System, Database System, System Structure, eBusiness, eCommerce, eMarketing, Computer Networks, Project Management in IT, Business Analysis and Modelling, Research Method.

3.     Supervise master student research and undergraduate co-op training.

4.     Prepare and deliver materials with effective presentation skills, both theoretical and practical to students using a systematic plan and conduct laboratory hands-on, case studies, and project discussion groups.

5.     Serve on faculty committees to develop curriculum planning, course syllabi, course materials, and degree requirements as per accreditation and international standards.

6.     Prepare, administer and grade examinations, laboratory assignments and reports for student progress assessments with use of eLearning System.

7.     Document and develop course specification and report in a standard format to be examined by the higher education ministry.

8.     Prepare documents that mapping course assessments with the course and program Learning Outcomes (LO).

9.     Prepare student assessment evaluation report with regards to the course and program Learning Outcomes (LO).

10.  Advise students on the course and academic matters and career decisions and direct research programs of graduate students and advise on research matters.

11.  Supervise independent or group projects, laboratory work or hands-on training in Microsoft Project Management, UML business analyst modelling, E-commerce application and website, Online marketing, and web HTML design.

12.  Provide consultation services for enhancement in IT department and offered technical assistance to solve IT and business related problems (e.g. GoogleApps education solution).

13.  Provide professional consultative services to governmental sectors and provide them advice on information systems security.

 

5. Designation: Lecturer in Information Systems (02/2008 – 06/2013)

1.     Teach, manage, and asses university subjects and instructions to undergraduate students at various levels within the program areas; subjects include: Information security, Introduction to Computing, Management Information System, Database System, System Structure, eBusiness, eCommerce, eMarketing, Computer Networks, Project Management in IT, and Business Analysis and Modelling.

2.     Conduct research in information system and security and publish findings in scholarly journals (see publication section at the end of the document).

3.     Supervise undergraduate co-op training students.

4.     Prepare and deliver materials with effective presentation skills, both theoretical and practical to students using a systematic plan and conduct laboratory hands-on, case studies, and project discussion groups.

5.     Serve on faculty committees to develop curriculum planning, course materials, and degree requirements as per accreditation and international standards.

6.     Prepare, administer and grade examinations, laboratory assignments and reports for student progress assessments with use of eLearning System.

7.     Document and develop course specification and report in a standard format to be examined by the higher education ministry.

8.     Prepare documents that mapping course assessments with the course and program Learning Outcomes (LO).

9.     Prepare student assessment evaluation report with regards to the course and program Learning Outcomes (LO).

10.  Advise students on the course and academic matters and career decisions and direct research programs of graduate students and advise on research matters.

11.  Provide end-user device security awareness as well as troubleshooting computer hardware/software in a laboratory.

12.  Supervise independent or group projects, laboratory work or hands-on training in Microsoft Project Management, UML business analyst modelling, E-commerce application and website, Online marketing, and web HTML design.

13.  Provide consultation services for enhancement in IT department and offered technical assistance to solve IT and business related problems (e.g. GoogleApps education solution).

14.  Provide professional consultative services to governmental sectors and provide them advice on information systems security.

15.  Develop policies and procedures throughout the software development lifecycle to maximize the efficiency, effectiveness and overall quality of software products and information systems.

16.  Act as Information Technology director on behalf.

 

Experience #2

Company Name

Effat University - Jeddah, Kingdom of Saudi Arabia

Duration

09/2015 - 01/2016

 

Designation: Lecturer, part-time

 

1.     Teach one or more university subjects to undergraduate; subjects include: Information security and policy, Cybercrime and cyber Warfare.

2.     Prepare and deliver lectures to students using a systematic plan with using Blackboard eLearning; and conduct laboratory hands-on, case studies, and project discussion groups.

3.     Prepare documents that mapping course assessments with the course and program Learning Outcomes (LO).

4.     Prepare a student assessment evaluation report with regards to the course and program Learning Outcomes (LO).

5.     Develop information security policies to avoid being a victim of cybercrime

6.     Present all type of Threats, cybercrime and warfare that facing any organization besides Malware (virus, worms, Trojan).

7.     Demonstrate tools for scanning and sniffing systems and networks to perform hijacking types, spoofing and poisoning types, system hacking, password cracking, wireless scanning.

8.     Evaluate existing Security solutions by testing them against existing attack-known traffic

Provide end-user device security awareness as well as troubleshooting computer hardware/software in a laboratory.

 

 

 

Experience #3

Company Name

Hamasaat Company for Audio and Video Production

Duration

09/2006 - 02/2008

 

Designation: Network Administrator and Web Developer

1.     Consulting, auditing in information systems.

2.     Manage Microsoft Windows Server 2008 Active Directory infrastructure of the company.

3.     Develop the website with integrating SQL database into PHP language.

4.     Analyze, evaluate, and monitor IT infrastructure to ensure networks are configured properly to performance enhancement and operate at high scalability.

5.     Prepare and maintain procedures and documentation for network inventory, and record diagnosis and resolution of network faults, enhancements and modifications to networks, and maintenance instructions.

6.     Deploy and install Antivirus for all servers & clients.

  1. Perform helpdesk for maintaining laptops & desktops hardware – software.

8.     Perform technical support for all types of network printers.

9.     Create eMarketing campaign in Adsense, Adwords, Facebook, and Youtube channels.

10.  Create and Manage file servers, documenting department and users permissions, backup and recovery.

11.  Use Team Viewer, Remote Desktop to solve any problem remotely

12.  Perform an Inventory Management of all IT assets like laptops, desktops, switches, routers, servers, printers’ screens and projectors in addition doing all purchasing procedures.

 

 

A.    Skills

 

Skill

Skill Level

Years of Experience

Academic Teaching

Expert

>10

Training

Medium

>4

IT Auditing

Medium

>5

Risk Assessment

Expert

>10

Research and Publications

Expert

>10

Presentation

Expert

>10

Planning and Organizing

Expert

>10

Database: Access and SQL

Medium

>4

eLearning System

Expert

>8

Computer Security Analyst and Ethical Hacking

Expert/Qualified

>10

Project Management Admin (Microsoft Project)

Expert

>5

Network Security Tools: Firewall, Intrusion Detection System (Bro IDS), Antivirus, SSL, and VPN

Expert/Qualified

>5

Online Marketing and E-commerce Applications: Google adsense, Google adwords

Expert

>10

Google Apps

Expert

>5

Microsoft Windows Professional

Expert/Qualified

>15

Network Analysis and Monitoring (Tcpdump, Wireshark, TcpReplay, NetFlow)

Expert

>8

Business Analysis and Modeling in UML Language (MS Visio and Smart Draw)

Expert

>7

Desktop Remote Access: Windows and Teamviewer

 

 

Information Security Policies Development

Medium

>2

Computer Programming (C++, HTML)

Medium

>3

Information Technology Management

Medium

>4

System Analysis and Maintenance (Linux, VMware)

Expert

>12

Machine Learning WEKA

Medium

>4

WireShark Network Analyzer

Medium

>3

MS Office (Word, Power Point, Excel, Access)

Expert

>10

Team Building, Motivational, Interpersonal, and Communication Skills, Flexibility, Reliability

Expert

>10

Ability to Work Under Pressure and with Dynamic Team, Decision Making & Problem Solving Skills

Expert

>10

Communicating Effectively with a Multiple Diverse Communities

Expert

>5