Yazeed Alabbad

Business Development Director - Cyber Data Digital at International Systems Engineering - ISE
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
SA
Languages
  • Arabic Native or bilingual proficiency
  • English Professional working proficiency

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

5.0

/5.0
/ Based on 1 ratings
  • (1)
  • (0)
  • (0)
  • (0)
  • (0)

Filter reviews by:

Abdullah Alamri

Yazeed is a wonderful manager, incredibly loyal and very focused on his team/ staffs well being. He is able to see challenges from all sides and, when required, find creative solutions. I am sure he will be an asset wherever he goes. It was a pleasure to have worked for Yazeed.

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • Develop Your Sales Knowledge and Skills
    LinkedIn
    Jul, 2022
    - Nov, 2024
  • Jeff Weiner on Leading like a CEO
    LinkedIn
    May, 2022
    - Nov, 2024
  • Creating Your IT Strategy
    LinkedIn
    Dec, 2021
    - Nov, 2024
  • Implementing the NIST Risk Management Framework
    LinkedIn
    Nov, 2021
    - Nov, 2024
  • Learning Data Governance
    LinkedIn
    Nov, 2021
    - Nov, 2024
  • Level 7 Diploma in Leadership and Management
    Inspire London College
    Jun, 2020
    - Nov, 2024
  • Advanced Memory Forensics & Threat Detection
    SANS Institute
    Mar, 2019
    - Nov, 2024
  • NUIX Certifued Engineer Foundation
    Nuix
    Dec, 2018
    - Nov, 2024
  • Foundations of IT Security: Operating System Security
    LinkedIn
    Nov, 2016
    - Nov, 2024
  • CISSP Cert Prep: 1 Security and Risk Management
    LinkedIn
    Oct, 2016
    - Nov, 2024
  • CISSP Cert Prep: 2 Asset Security
    LinkedIn
    Oct, 2016
    - Nov, 2024
  • Computer Security: Investigation and Response
    LinkedIn
    Oct, 2016
    - Nov, 2024
  • HP ArcSight ESM Security Administrator and Analyst
    Hewlett-Packard
    Jul, 2015
    - Nov, 2024
  • Certified Incident handling Engineer(CIHE)
    Mile2
    Mar, 2015
    - Nov, 2024
  • Certified Penteration Testing Engineer(CPTE)
    Mile2
    Feb, 2015
    - Nov, 2024
  • Security+
    CompTIA
    Dec, 2014
    - Nov, 2024
  • Linux +
    CompTIA
    Oct, 2014
    - Nov, 2024
  • Network+
    CompTIA
    Aug, 2014
    - Nov, 2024
  • Linux Server Professional Certification(LPIC1)
    Linux Professional Institute
    Jan, 2014
    - Nov, 2024
  • Microsoft Technology Associate (MTA)
    Microsoft
    Jan, 2014
    - Nov, 2024
  • SUSE Certified Linux Administrator(SCLA)
    SUSE
    Jan, 2014
    - Nov, 2024
  • Certified Chief Information Security Officer (CCISO)
    EC-Council
    Dec, 2021
    - Nov, 2024
  • GRC Auditor
    OCEG (Open Compliance & Ethics Group)
    Jun, 2022
    - Nov, 2024
  • GRCP
    OCEG (Open Compliance & Ethics Group)
    Dec, 2021
    - Nov, 2024
  • GIAC Certified Intrusion Analysts (GCIAs)
    GIAC
    Jun, 2016
    - Nov, 2024

Experience

    • Saudi Arabia
    • IT Services and IT Consulting
    • 100 - 200 Employee
    • Business Development Director - Cyber Data Digital
      • Jun 2022 - Present

      - Communicate business development strategies with key stakeholders. - Develop business agreements with identified partners, suppliers and vendors according to existing market expansion plans. - Lead engagement with strategic key customer segments - Evaluate business opportunities using insight, data and business analytical tools. - Developing customers awareness of ISE cyber security, data capabilities, and understand their needs. - Evaluate new businesses and regional relationships to increase market share through partnerships, Mergers and Acquisitions (M&A) and Joint Ventures (JV). - Evaluate strategies to leverage relationships and network for business opportunities and partnerships. - Lead M&A, JV and partnerships negotiations. - Lead conversion of proposals to confirmed M&A and JV deals. - Review business development strategies to ensure alignment with overall corporate strategies. - Review emerging trends and market movements to identify potential revenue streams and business threats. - Work with internal stakeholders to adapt existing products and services for new markets and business opportunities. Show less

    • Cyber Security Advisor
      • Feb 2022 - Jun 2022

      Worked on project about helping IT start-up company in term of pricing services, market insight, develop market penetrate GTM plan and the right customers segments. Worked on project about helping IT start-up company in term of pricing services, market insight, develop market penetrate GTM plan and the right customers segments.

    • Saudi Arabia
    • Financial Services
    • 1 - 100 Employee
    • CISO - Head Of Cybersecuity
      • Feb 2022 - Mar 2022

      o Develop, implement and monitor a strategic, comprehensive enterprise information security and IT risk management program o Work directly with the business units to facilitate risk assessment and risk management processes o Develop and enhance an information security management framework to comply with regulators such as SAMA, NCA and SDAIA. o Understand and interact with related disciplines through committees to ensure the consistent application of policies and standards across all technology projects, systems and services o Provide leadership to the enterprise's information security organization o Partner with business stakeholders across the company to raise awareness of risk management concerns o Assist with the overall business technology planning, providing a current knowledge and future vision of technology and systems to be resilience and secure. Show less

    • Saudi Arabia
    • IT Services and IT Consulting
    • 1 - 100 Employee
    • Managed Cyber Security Services Senior Manager
      • Jan 2020 - Feb 2022

      o Managing cybersecurity services, take over CISO tasks such as governance, risk management, meeting regulatory and standardization compliance ISO, NCA, SCB-SAMA and CMA. o Coached and shaped the team to utilize best of their skills and expertise to alien with vision and target goals. o Developed a strategic and business plan to align with company vision with considering market demands. o Demonstrated client relationship management experience and a high skill level for managing complex escalations. o Oversaw of operation security services activities, processes, and polices as required and responsible for driving, monitoring, and tracking client satisfaction. o Problem-solving that reflected on retaining customers. o Supported sales and presales on building RFP and Proposals. o Planning and enabled clients to follow the best practice on hiring security expertise and advice on security roadmap. o Consulting the client how to be proactive and cyber resilient. Show less

    • Saudi Arabia
    • Insurance
    • 300 - 400 Employee
    • Cyber Security Operations Manager
      • Nov 2019 - Jan 2020

      - Managing the cyber security operation of Infrastructure, SOC/TH, VAPT and DFIR. - Develop all needed process and procedure of cyber security operations. - Assess and engage with third party/ vendor for security solutions. - Help the CISO to met cyber security framework requirements(NIST,SAMA and NCA). - Working with risk management to met the risk management framework requirements. - Provide recommendations to CISO on term of DFIR,SOC, threat intelligence and incident handling with creating executive report for each. Show less

    • Saudi Arabia
    • IT Services and IT Consulting
    • 700 & Above Employee
    • Cyber Security Expert
      • Nov 2018 - Nov 2019

      Technical lead of digital forensics and compromise assessment projects.Managing and building digital forensics lab with ISO/IEC 17025.Provide consultation for best practice of digital forensics and incident response to our clients include solutions, software/hardware tools, process and procedure.Conduct host forensics, network forensics, log analysis, and malware triage in support of incident response investigations.Threat hunting by using security solutions, threat Intelligence platform and scripting. Show less

    • DFIR | Malware Analyst
      • Apr 2018 - Oct 2018

      Conduct digital forensics process and procedure as technical (include evidence seizure, computer forensic analysis, network forensics and data recovery).Reverse-engineer compiled executable code to examine how programs interact with their environment.Perform malware analysis and reverse engineering, as needed in support of the resolution of security incidents.Create in depth and high level reports based on findings.Verbally brief senior management on findings.Assist with incident response tasks and ensure removal of all malware related artifacts.Coordinate with other teams, organizations, customers and ensure that everyone is up to date at all times.Assist with insider threat, cyber intelligence and soc tasks.Evidence inventory and proper chain of custody management. Show less

    • Cyber Security Engineer
      • Mar 2017 - Mar 2018

      What is Red Team & Blue Team doing usually.- Incident Handling.- Forensics Analysis.- Security Enhancement.- Configuration Review- Vulnerability assessment.- Penetration testing.So, That makes me the purple one.

    • Saudi Arabia
    • IT Services and IT Consulting
    • 700 & Above Employee
    • Security Analyst
      • Apr 2016 - Feb 2017

      Security monitoring and monitoring the environment for alertsConducts computer investigations.Responds and/or mitigates security breaches and attacks to the infrastructure.Conducts vulnerability and threat analysis for the environment.Incident Response: Demonstrates the ability to respond quickly to reports from individuals. Takes immediate action to stop an incident from continuing or recurring. Determines whether an incident should be handled locally or reported to IT Teams. Works with the IT support staff to repair a system, restore service, and preserve evidence of the incident. Handles sensitive and other critical responses in a professional manner. Evaluates and documents investigation findings after resolving an incident.Network Forensics: Possesses sufficient fundamental proficiency to successfully demonstrate Network Forensics in practical applications of moderate difficulty.◦Anomaly Detection: Possesses sufficient fundamental proficiency to successfully demonstrate Anomaly Detection practices in practical applications of moderate difficulty. Has a basic understanding of network behavior analysis techniques and tools. Capable of using Intrusion Detection Systems software.Cyber Threat Intelligence. Show less

    • Junior Security Analyst
      • Jun 2014 - Mar 2016

      Security monitoring and monitoring the environment for alertsAnalyses the structure and stability of a company's computer network.Sets up alert systems to detect security breaches.Addresses any warning signs, hacking issues, or other network security problems.Works to close security breach as soon as possible.Identifies and analyses sources of breach.Troubleshoots any glitches or problems with network security programs.Makes client visits to perform on-site analysis or maintenance of security systems.Maintains logs and writes reports regarding information security activity. Show less

    • Saudi Arabia
    • Higher Education
    • 100 - 200 Employee
    • System Specialist and Training
      • Nov 2013 - Jun 2014

      Project coordinator. Train new employee on the systems. System Analysis. Project coordinator. Train new employee on the systems. System Analysis.

    • Saudi Arabia
    • Research Services
    • 700 & Above Employee
    • Programmer training
      • May 2013 - Aug 2013

      I was required to deliver HR Application with features: Check for department tasks and status. Payrolls balance portal. Track all projects with status. Link all HR process with database management. I was required to deliver HR Application with features: Check for department tasks and status. Payrolls balance portal. Track all projects with status. Link all HR process with database management.

Education

  • Swiss School of Business and Management
    Executive MBA, Cybersecurity Management
    2020 - 2022
  • Al-Imam Muhammad Ibn Saud Islamic University
    Bachelor's degree, Computer Science
    2006 - 2013

Community

You need to have a working account to view this content. Click here to join now