Badges

55 Points
8 Years

User Activity

About me

Perform Penetration Testing and Vulnerability Assessments of Internal and External IT Systems;
Supervision and control of the processes in company from aspect of IT incidents;
Perform Penetration Tests of all internal IT/NT Systems;
Creation of Security Requirements for all projects related to IT/NT Systems and applications;
Monitoring audit logs, Maintaining the ArcSight Central Log Analyzing System and creating custom reports and alerts for any misuse of private data;
Monitoring IPS/IDS System and testing malicious attacks.
Performing Security Audits on internal processes and systems that might lead to possible fraudulent activities;
Vulnerability checks, data privacy check etc;
Coordinator for preparing T-Home MK Asset Register and Security Risk Assessment for acquiring ISO 27001 certificate;
Creating Internal Security Directives and procedures;
Evaluation and risk analysis of new products from security point of view;
Participate in the improvement and development of process/procedure manuals and documentation;
Define, create and maintain the documentation for certification and accreditation of each information system in accordance with government requirements;
Assessments of impacts on system modifications and technological advances. Additionally, review systems in order to identify potential security weaknesses, recommend improvements to amend vulnerabilities, implement changes and document upgrades;
Researching, developing, implementation, testing and reviewing organization's information security in order to protect information and prevent unauthorized access. Inform users about security measures, explain potential threats, install software, implement security measures and monitor networks;

Specialties: Ethical Hacking, Penetration Testing, IT Audits, Monitor and Analyzing the Logs, Investigations, Forensics.