Mohammad Shahadat Hossain

Similar documents
ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized.

Unlocking Potential Through Learning

Certified Information Security Manager (CISM) Course Overview

Ingram Micro Cyber Security Portfolio

Career Paths In Cybersecurity

Job Specification & Recruiting Profile of Vacancy

THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY :

ISSMP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard

Les joies et les peines de la transformation numérique

Building Secure Systems

A New Cyber Defense Management Regulation. Ophir Zilbiger, CRISC, CISSP SECOZ CEO

Course Schedule January December 2019

Spillemyndigheden s requirements for accredited testing organisations. Version of 1 July 2012

BHConsulting. Your trusted cybersecurity partner

Ben Eu. Summary. Experience. Associate Partner, Infrastructure & Endpoint Security at IBM

แนวทางการพ ฒนา Information Security Professional ในประเทศไทย

Certified Cyber Security Specialist

Assurance through the ISO27002 Standard and the US NIST Cybersecurity Framework. Keith Price Principal Consultant

CERTIFICATION TRAINING - ISC2

locuz.com SOC Services

building for my Future 2013 Certification

DIABLO VALLEY COLLEGE CATALOG

BHConsulting. Your trusted cybersecurity partner

Skillsoft Pre-Approved for CompTIA CEUs

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH

COURSE BROCHURE. COBIT5 FOUNDATION Training & Certification

UPDATED: 10/17/16. Senior Level. Senior Specialty Threat, Consultant, Engineer, Manager. Mid Level Analyst

Global Security Consulting Services, compliancy and risk asessment services

EC-Council - EC-Council Certified Security Analyst (ECSA) v8

2018 CALENDAR OF ACTIVITIES

Application for Certification

CURRICULUM VITAE SHON L. HARRIS, CISSP

What is the CISSP? Certified Ethical Hacker v8 or higher Certified Forensic Computer Examiner (CFCE) Certified Fraud Examiner (CFE)

Your Trusted Partner in Europe European Business Reliance Centre

Helping you understand the impact of GDPR.

CCISO Blueprint v1. EC-Council

Table of Contents. Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING

About Us. We re now the world s largest independent IT training company, and we continue to lead

Reasons to Become CISSP Certified. Keith A. Watson, CISSP CERIAS

INFORMATION SECURITY GOVERNANCE, RISK & COMPLIANCE CLOUD CONSULTING SERVICES CIO & CISO SERVICES. forebrook

Farzad Diba 333 East Juniper Court Mequon, WI (414)

Governance, Organisation, Law, Regulation and Standards Syllabus QAN 603/0855/2

IT Technician Pathways Course Guide

CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs)

CITY OF MONTEBELLO SYSTEMS MANAGER

UK Permanent Salary Index November 2013 Based on registered vacancies and actual placements

Performing a Vendor Security Review TCTC 2017 FALL EVENT PRESENTER: KATIE MCINTOSH

BRING EXPERT TRAINING TO YOUR WORKPLACE.

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION

Cybersecurity Employment SecureNinja

Cyber Security Advanced Education: Preparing the Emerging Workforce

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

INFORMATION SYSTEMS AUDITOR EXAM PREPARATION COURSE NICOSIA LIVE ON-LINE. 1 P a g e

AT FIRST VIEW C U R R I C U L U M V I T A E. Diplom-Betriebswirt (FH) Peter Konrad. Executive Partner Senior Consultant

Tim Heagarty, CISA CISSP - (859) Lexington, KY

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Account Executive / Account Manager

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

COBIT 5 With COSO 2013

Data Sheet The PCI DSS

Aligning IT, Security and Risk Management Programs. Ahmed Qurram Baig, CISSP, CBCP, CRISC, CISM Information Security & GRC Expert

(Aws solution architect -Associate, ITIL, CEH, MCSE, Linux, CCNA, Open source expert) LinkedIn Profile:

ROLE DESCRIPTION IT SPECIALIST

No IT Audit Staff? How to Hack an IT Audit. Presenters. Mark Bednarz, Partner-In-Charge, Risk Advisory PKF O Connor Davies, LLP

Operationalizing Cybersecurity in Healthcare IT Security & Risk Management Study Quantitative and Qualitative Research Program Results

Business Context: Key for Successful Risk Management

Information Security Architecture Gap Assessment and Prioritization

Designing and Building a Cybersecurity Program

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY

Pluralsight CEU-Eligible Courses for CompTIA Network+ updated March 2018

Security In A Box. Modular Security Services Offering - BFSI. A new concept to Security Services Delivery.

HITRUST CSF Assurance Program HITRUST, Frisco, TX. All Rights Reserved.

Juan R. Reyes, CISSP Kelly Drive, Point Venture, TX

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD

Position Description IT Auditor

IT MANAGER PERMANENT SALARY SCALE: P07 (R ) Ref:AgriS042/2019 Information Technology Manager. Reporting to. Information Technology (IT)

CyberVista Certify cybervista.net

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

What every IT professional needs to know about penetration tests

Cloud Security Certification CCSP Certified Cloud Security Professional

Suma Soft s IT Risk & Security Management Solutions for Global Enterprises

ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. And

PROFILE FRANCIS KAITANO. Francis Kaitano is a strategic, innovative, delivery focused Cyber Security professional.

ISACA MANILA CHAPTER CALENDAR OF ACTIVITIES

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ

Request for Proposal (RFP)

CISM Certified Information Security Manager

PUBLIC COURSE SCHEDULE. July - December 2017

Click to edit Master title style. DIY vs. Managed SIEM

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most

Information & Communication Technologies. Certification & Professional Qualification Training Programs

NATIONAL INFORMATION TECHNOLOGY AUTHORITY - UGANDA (NITA-U) REGIONAL COMMUNICATIONS INFRASTRUCTURE PROGRAM (RCIP) INFORMATION SECURITY SPECIALIST

Tips for Passing an Audit or Assessment

Federal Virtual Training Environment (FedVTE) Pre-Approved for CompTIA CEUs

REQUEST FOR EXPRESSIONS OF INTEREST

HRSD Position Description: UNIX Systems Administrator

Certified Ethical Hacker V9

Transcription:

Mohammad Shahadat Hossain Principal Security Architect at Grameenphone Limited Summary Has extensive knowledge and experience on following:- NIST Cyber Security Framework SANS Top 20 Security Control Network Connectivity Architecture System/Database/Network Device Hardening Vulnerability Assessment Penetration Testing Security Configuration Review PCI-DSS Complinace Implementaion Security Policy Development IT Strategic Planning SIEM Implementation CEH, ECSA, CISSP, CISA Training Security Awareness Training Experience Principal Security Architect at Grameenphone (Largest Telecom Operator in Bangladesh) December 2015 - Present (1 year 4 months) Aligning business strategy to Information Security Strategy Preparing a Security Architecture for Grameenphone Implementation of NIST Information Security Framework in Grameenphone Prepare and implement policy and procedures pertaining to the framework/architecture Preparing and Implementing Security Hardening Guide Conducting Security Awareness Training Conducting Internal Penetration Testing Senior Information Security Analyst at Eastern Bank Limited February 2015 - November 2015 (10 months) Development, implementation and maintenance of organization-wide information system security plan. PCI-DSS compliance implementation Monitor the process of handling Information security policy exception. Advise the Head of Risk & Bank Management on IT related risks issues and recommend appropriate actions in support of the Bank s larger risk management programs. Page1

Ensure related compliance requirement are addressed, e.g., privacy, security and administrative regulations associated with regulatory requirement and law. Ensure implementation of security standards. Ensure implementation of Information Security Governance. Participate in the planning and design of security architecture where appropriate. Conduct Information System Security Assessment for Servers, Database, Network, applications. Evaluate the IT infrastructure from Security Perspective and recommend appropriate control improvements. Ensure support of IT Audits information systems, platforms and operating procedures in accordance with established corporate standards for efficiency, accuracy and security. Evaluates IT infrastructure in terms of risk to the organization and establishes controls to mitigate loss. Determines and recommends improvements in current risk management controls and implementations of IT system changes and upgrades. Provide IT Awareness Training (CBS, CMS, Networking, etc) to all the users of EBL Participate in all the IT Projects to perform pre and post Risk Assessment of the projects. National IT Security and Audit Specialist at Cowater International Inc. April 2009 - January 2015 (5 years 10 months) Prepare and Implement OCAG s IT strategic plan Integrate IT Based tools and techniques in OCAG audit methodologies Introducing IT Audit and Conducting IT Audit in OCAG Developing training courses on IT governance, IS Auditing, IT System s Security and Controls Planning and Implementation of OCAG data network Infrastructure Develop and implement necessary policies and procedures for IT Systems operations and development Implement OCAG network security and administration of OCAG WAN Head, Enterprise Information Security at Robi Axiata Limited January 2005 - March 2009 (4 years 3 months) Alignment of IT Strategic Plan with Enterprise Strategic Plan Implemented ITIL Processes for smooth IT Operation Management Identifying monitor and evaluate KPIs for Performance Measurement of all IT Services Monitored and Measured the Divisional KPIs using IT Balance Score Card Strategic Planning of Organizational Information Security Management IT Risk analysis and treatment as per enterprise strategy Information Security Policy Development, Enforcement, Monitoring and Improvement Implemented Information Security Management System based on ISO 27001 Conducting Information security awareness program throughout the organization Network Administrator at Islami Bank Bangladesh Limited March 2002 - December 2004 (2 years 10 months) Page2

Administer network workstations, utilizing one or more TCP/IP networking protocols and/or one or more UNIX-based or non-unix based operating systems. Evaluate and/or recommend purchases of computers, network hardware, peripheral equipment, and software; Managed IT services like DNS, Mail, Web Investigate user problems, identify their source, determine possible solutions, test and implement solutions. Install, configure, and maintain personal computers, UNIX Servers, file servers, Ethernet networks, network cabling, and other related equipment, devices, and systems; adds or upgrades and configures modems, disk drives, printers, and related equipment. Perform and/or oversee software and application development, installation, and upgrades. System Engineer/Sr. System Engineer at Spectrum Engineering Consortium Ltd. June 1996 - February 2002 (5 years 9 months) Understanding client s Requirements and providing cost effective solution for the client Providing support to the client Assembling Clone PCs/Troubleshooting PCs, Printers Certifications Certified Information Systems Security Professional (CISSP) (ISC)2 License 319078 December 2008 to December 2014 Certified Information Security Manager (CISM) ISACA License 12580098 August 2012 to August 2015 Certified Information Systems Security Auditor (CISA) ISACA License 12580098 August 2010 to August 2015 Certified Data Center Professional (CDCP) EPI Certified Payment Card Industry Standard Implementer (CPISI) SISA, India Certified Information Technology Manager (CITM) EPI, Singapore September 2011 Information Technology Infrastructure Library (ITIL) OGC ISMS Auditor (ISO27001) IRCA April 2008 to April 2013 Certified Ethical Hacker (CEH) EC COUNCIL Computer Hacking Forensic Investigator EC-Council April 2009 LPT (Licensed Penetration Tester) EC-Council License MS13-72 October 2013 Certified in Risk and Information Systems Control (CRISC) ISACA February 2014 Page3

Skills & Expertise IT Operation IT Security IT Audit Ethical Hacking Penetration Testing ISO27001 Implementation ITIL Vulnerability Assessment PCI-DSS Implementation Information Security CEH PCI DSS CISA ISO 27001 Information Technology IPS Network Security OSPF CCNA Risk Management Security Computer Security Cisco Technologies Routing Protocols Windows Server Governance EIGRP Red Hat Linux Information Security Management Virtualization Microsoft Certified Professional Vulnerability Management Routing ASA CISSP Microsoft Exchange CISM SCCM Disaster Recovery Network Architecture Solaris Firewalls Network Administration Page4

Networking Network Design Antivirus VPN COBIT McAfee PIX Education American International University-Bangladesh MSc, Distributed Computing, 2008-2009 Grade: A+ Shahjalal University of Science and Technology B.Sc., Physics, 1991-1995 Page5

Mohammad Shahadat Hossain Principal Security Architect at Grameenphone Limited Contact Mohammad on LinkedIn Page6