AbdulrahmanSabbagh UnitedArabEmirates 12.03 Yrs
AbdulrahmanSabbagh UnitedArabEmirates 12.03 Yrs
Sabbagh
MSc. Specialization in Cyber Security
UAE Contact# +9715(0)-7731822, +9715(2)-6089495 E-mail caneec@gmail.com
PROFESSIONAL SYNOPSIS
▪ Information and IT Security specialist with a passion and talent for aligning security architecture, plans, controls,
processes, policies and procedures with security standards and operational goals, Manage and lead security incident
response efforts
▪ Comprehensive understanding of security controls and solutions crosswise different layers, efficiently identify, research
and recommend controls, and mitigation plans Identity and access management
▪ Specialist in Information Security Frameworks (e.g. ISO 27001, ISO 22301, PCI DSS and Cyber Essentials)
▪ Abreast in Cyber security best practices within various technologies: Cloud, IoT, telecom, application security, network
security, data protection and privacy, NIST, CIS, NESA
▪ Served as incident commander for high severity response operations and act as the primary point of contact for presenting
executive communication.
▪ Orchestrated yearly integrated risk assessments based on enterprise risk taxonomy for Tier IV data center by analyzing
risk appetite; published business intelligence dashboards to senior executives on business process recovery strategies,
business continuity plans, emergency response with RTO summary, RPO for technology projecting effectiveness of controls,
residual risks, dependency information, CIA metrics, MTTR metrics, and financial metrics
▪ Provide architecture, technical design and advice to internal teams on how to securely develop and build applications and
supporting systems in both cloud and on-premises network ecosystems
▪ Leading the cyber defense team and SOC capabilities, and review alert closure notes by analyst and drive response quality.
Develop and improve processes & procedures for application security during development lifecycle and maintain standards
documentation as required.
▪ Develop, plan and deliver targeted data protection education campaigns for different cohorts of data controllers; prepare
and publish innovative data protection guidance
▪ Data protection and privacy, Network security, Encryption, Perimeter defense, Virtualization, end-point protection, Portable
devices security, Business continuity, IDS/IPS
TECHNICAL SKILLS
Security attack pathologies Risk analysis and mitigation Cloud and Security Analysis
Identify strengths and weaknesses of IT Create, Modify, and Update Security Experience with hacking and anti-
systems Information Event Management (SIEM) hacking software.
Tools
Linux Experience (Kali, Ubuntu) Firewalls, DNS, IP addressing, SSL/TLS Tomcat, PostgreSQL, SAML, IMAP,
PowerShell, Python and certificates LDAP, Active Directory, SSO,
Wireshark and TCPDUMP
Develop, maintain and brief network Cryptography, PKI, IPS and SSL Big Data Analysis
maps and link diagrams
Conducting & managing technical Wireless Technologies WEP, WPA2/3 Intelligence Information Gathering
validation events (POC)
Metasploit, Nmap, Nessus, Burpsuite Networking protocols, MiTM, ARP Cross site Scripting (XSS), Privilege
spoofing Escalation
1
EDUCATIONAL QUALIFICATION
2017
MSc. Specialization in Cyber Security, Zayed University, United Arab Emirates
2013 Bachelor of Networks & Communications Engineering, Al Ain University of Science & Technology - UAE
2009 General Secondary Certificate, Islamic Institute, High School, UAE
Highlights
▪ Provide independent, objective assessment to evaluate whether client’s management systems comply with ADHICS or
ISO27001 Standards.
While on audits; assess client controls, identify control weaknesses and areas for process improvements.
Provide detailed assessment reports following each client audit.
Report all audit findings to the clients’ management team and ensure that corrective action plans are implemented
accordingly.
Follow up on clients’ technical requests in a timely manner as per the established process.
Responsible for diary management and administration duties associated with allocated tasks.
▪ Manage information security compliance according to information security standards based on Statement of Applicability
for the enterprise.
▪ Responsible for periodic, timely review and analysis of security systems and sub-systems to determine compliance with
defined policies, processes, procedures with alignment to ISO 27001 standard.
▪ Maintain and protect the confidentiality, integrity, and availability (CIA) quotient by evaluating people, process, tools,
and technologies.
▪ Conducts risk assessments and gap assessment to identify security posture and maintain evidences of compliance.
▪ Review technical documents, proposals, and other materials for accuracy, consistency, and quality control, utilizing
state-of-the-art technology in comparison to information security controls.
▪ Provides input during the design, configuration, development, and implementation of information security architecture.
▪ Contributes in maintaining and updating consolidated compliance catalogue for all applicable standards and frameworks
like ISO and local regulations like ADHICS, SIA, ADSIC and NCEMA.
▪ Perform periodic business users and privilege users access reviews as per policy requirements
▪ Successfully manage the yearly certification and surveillance audits by training all the Business units as part of audit
readiness and evidences management
▪ Work with the business stakeholders to close the internal and external audit & security testing findings.
ORGANIZATIONAL EXPERIENCE
Injazat Data Systems, Abu Dhabi, U.A. E since December’14
Highlights
▪ Provide strategic direction for incident remediation, and security enhancement to improve detection and prevention of
future attack
▪ End to end implementation of large-scale integrated management systems, led the organization for successful compliance
programs and ISO certifications for authoritative sources such as ISO 27001, ISO 22301, ISO 20000, ISO 9001 in
alignment with local and regulatory requirements like ISR, NCEMA, ADSIC, NESA, NIAF, CIIP, HIPAA, SSAE 16 standard
etc.,
▪ Enable business with development of Cloud security framework and policies for risk assessment of managed services -
IaaS, PaaS and SaaS.
▪ Create end-to-end security solutions involving a mix of technical and organizational requirements and trend cyber defense
controls
▪ As a Management Representative, certified and maintained large scale for enterprise wide ISO programs for Business
Continuity, Information Security
▪ Maintain risk reports for all business units, and Top risks tax anomy report for Senior Management.
▪ Provide executive management with the necessary information to make informed decisions about investment in
information security and business continuity aligned with organizational goals and objectives
▪ Implemented mass mailer notification communication systems for crisis management and automated large-scale call tree
testing on an enterprise level covering critical recovery support teams during planned DR drills as part of testing and
exercising campaigns
▪ Research, evaluate and drive next-generation security technologies and concepts to keep security ahead of the curve
▪ Design, implement, train, and exercise Business resiliency and Disaster recovery with detailed business continuity plans
supported by testing schedules for business and service continuity of all the business processes with integrated risk
management framework and impact ratings
2
▪ Established, managed and evolved an integrated incident management procedure for cyber security, information security,
business continuity and service management ensuring the monitoring enablement with enterprise SIEM tools to protect
CIA
▪ Automate Information governance with data classification based on sensitivity, persistent protection and leakage
prevention on all the critical data sources in the enterprise integrated with authentication controls
▪ Prevent inadvertent data loss by establishing Data privacy and protection controls for personally identified information and
critical data sources linked with cryptographic controls
▪ Manage Security enhancement projects for operations by establishing controls like segregated environments, network
access controls, privileged administration management, multi factor authentication, end point encryption and protection
▪ Manage governance for identity and data access thereby establishing role-based access controls, risk-based entitlement
provisioning, automated access certifications and reviews per regulatory compliance requirements
Key Knowledge Areas in GRC, Information Security, Risk Assurance and Security Architect:
▪ Manage changes and update key documentation, document cross functional processes and workflow processes
▪ Review technical and solution design documents and turn them into efficient technical design and scope documents
▪ Knowledge on some emerging ICS Security products such as Nozomi, CyberX, Verve, Indegy, Claroty, and/or Check Point
Software
▪ Implement Identity and access governance solution to initiate certifications for user access reviews, maintain separation
of duties, audit traceability for identity registration and de-registration in an organization.
▪ Review and baseline security architecture based on vulnerability assessment and penetration testing results for the entire
infrastructure
▪ Risk assess new systems development and acquisitions by evaluating proposed architectures, reviewing integration points
for existing controls and operational systems, performing business impact analysis, securing remote connectivity with
authentication and cryptographic requirements.
▪ Orchestrate a major security control baseline program for information systems identifying estimated threat coverage and
baselined the security posture of the organization by integrating the MSBs into vulnerability assessments before operational
readiness of critical systems
3
Tools Automation Expertise
Personal Information
Place & Date of birth 31st of March 1991, United Arab Emirates
Gender Male
Nationality Syria
Marital Status Married
Visa Status Resident Visa
Driving License United Arab Emirates
Languages Arabic & English