Yazeed Alabbad
Business Development Director - Cyber Data Digital at International Systems Engineering - ISE- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
-
Arabic Native or bilingual proficiency
-
English Professional working proficiency
Topline Score
Bio
Abdullah Alamri
Yazeed is a wonderful manager, incredibly loyal and very focused on his team/ staffs well being. He is able to see challenges from all sides and, when required, find creative solutions. I am sure he will be an asset wherever he goes. It was a pleasure to have worked for Yazeed.
Abdullah Alamri
Yazeed is a wonderful manager, incredibly loyal and very focused on his team/ staffs well being. He is able to see challenges from all sides and, when required, find creative solutions. I am sure he will be an asset wherever he goes. It was a pleasure to have worked for Yazeed.
Abdullah Alamri
Yazeed is a wonderful manager, incredibly loyal and very focused on his team/ staffs well being. He is able to see challenges from all sides and, when required, find creative solutions. I am sure he will be an asset wherever he goes. It was a pleasure to have worked for Yazeed.
Abdullah Alamri
Yazeed is a wonderful manager, incredibly loyal and very focused on his team/ staffs well being. He is able to see challenges from all sides and, when required, find creative solutions. I am sure he will be an asset wherever he goes. It was a pleasure to have worked for Yazeed.
Credentials
-
Develop Your Sales Knowledge and Skills
LinkedInJul, 2022- Nov, 2024 -
Jeff Weiner on Leading like a CEO
LinkedInMay, 2022- Nov, 2024 -
Creating Your IT Strategy
LinkedInDec, 2021- Nov, 2024 -
Implementing the NIST Risk Management Framework
LinkedInNov, 2021- Nov, 2024 -
Learning Data Governance
LinkedInNov, 2021- Nov, 2024 -
Level 7 Diploma in Leadership and Management
Inspire London CollegeJun, 2020- Nov, 2024 -
Advanced Memory Forensics & Threat Detection
SANS InstituteMar, 2019- Nov, 2024 -
NUIX Certifued Engineer Foundation
NuixDec, 2018- Nov, 2024 -
Foundations of IT Security: Operating System Security
LinkedInNov, 2016- Nov, 2024 -
CISSP Cert Prep: 1 Security and Risk Management
LinkedInOct, 2016- Nov, 2024 -
CISSP Cert Prep: 2 Asset Security
LinkedInOct, 2016- Nov, 2024 -
Computer Security: Investigation and Response
LinkedInOct, 2016- Nov, 2024 -
HP ArcSight ESM Security Administrator and Analyst
Hewlett-PackardJul, 2015- Nov, 2024 -
Certified Incident handling Engineer(CIHE)
Mile2Mar, 2015- Nov, 2024 -
Certified Penteration Testing Engineer(CPTE)
Mile2Feb, 2015- Nov, 2024 -
Security+
CompTIADec, 2014- Nov, 2024 -
Linux +
CompTIAOct, 2014- Nov, 2024 -
Network+
CompTIAAug, 2014- Nov, 2024 -
Linux Server Professional Certification(LPIC1)
Linux Professional InstituteJan, 2014- Nov, 2024 -
Microsoft Technology Associate (MTA)
MicrosoftJan, 2014- Nov, 2024 -
SUSE Certified Linux Administrator(SCLA)
SUSEJan, 2014- Nov, 2024 -
Certified Chief Information Security Officer (CCISO)
EC-CouncilDec, 2021- Nov, 2024 -
GRC Auditor
OCEG (Open Compliance & Ethics Group)Jun, 2022- Nov, 2024 -
GRCP
OCEG (Open Compliance & Ethics Group)Dec, 2021- Nov, 2024 -
GIAC Certified Intrusion Analysts (GCIAs)
GIACJun, 2016- Nov, 2024
Experience
-
International Systems Engineering - ISE
-
Saudi Arabia
-
IT Services and IT Consulting
-
100 - 200 Employee
-
Business Development Director - Cyber Data Digital
-
Jun 2022 - Present
- Communicate business development strategies with key stakeholders. - Develop business agreements with identified partners, suppliers and vendors according to existing market expansion plans. - Lead engagement with strategic key customer segments - Evaluate business opportunities using insight, data and business analytical tools. - Developing customers awareness of ISE cyber security, data capabilities, and understand their needs. - Evaluate new businesses and regional relationships to increase market share through partnerships, Mergers and Acquisitions (M&A) and Joint Ventures (JV). - Evaluate strategies to leverage relationships and network for business opportunities and partnerships. - Lead M&A, JV and partnerships negotiations. - Lead conversion of proposals to confirmed M&A and JV deals. - Review business development strategies to ensure alignment with overall corporate strategies. - Review emerging trends and market movements to identify potential revenue streams and business threats. - Work with internal stakeholders to adapt existing products and services for new markets and business opportunities. Show less
-
-
-
-
Cyber Security Advisor
-
Feb 2022 - Jun 2022
Worked on project about helping IT start-up company in term of pricing services, market insight, develop market penetrate GTM plan and the right customers segments. Worked on project about helping IT start-up company in term of pricing services, market insight, develop market penetrate GTM plan and the right customers segments.
-
-
-
Tamam
-
Saudi Arabia
-
Financial Services
-
1 - 100 Employee
-
CISO - Head Of Cybersecuity
-
Feb 2022 - Mar 2022
o Develop, implement and monitor a strategic, comprehensive enterprise information security and IT risk management program o Work directly with the business units to facilitate risk assessment and risk management processes o Develop and enhance an information security management framework to comply with regulators such as SAMA, NCA and SDAIA. o Understand and interact with related disciplines through committees to ensure the consistent application of policies and standards across all technology projects, systems and services o Provide leadership to the enterprise's information security organization o Partner with business stakeholders across the company to raise awareness of risk management concerns o Assist with the overall business technology planning, providing a current knowledge and future vision of technology and systems to be resilience and secure. Show less
-
-
-
Innovative Solutions SA
-
Saudi Arabia
-
IT Services and IT Consulting
-
1 - 100 Employee
-
Managed Cyber Security Services Senior Manager
-
Jan 2020 - Feb 2022
o Managing cybersecurity services, take over CISO tasks such as governance, risk management, meeting regulatory and standardization compliance ISO, NCA, SCB-SAMA and CMA. o Coached and shaped the team to utilize best of their skills and expertise to alien with vision and target goals. o Developed a strategic and business plan to align with company vision with considering market demands. o Demonstrated client relationship management experience and a high skill level for managing complex escalations. o Oversaw of operation security services activities, processes, and polices as required and responsible for driving, monitoring, and tracking client satisfaction. o Problem-solving that reflected on retaining customers. o Supported sales and presales on building RFP and Proposals. o Planning and enabled clients to follow the best practice on hiring security expertise and advice on security roadmap. o Consulting the client how to be proactive and cyber resilient. Show less
-
-
-
MEDGULF Saudi Arabia
-
Saudi Arabia
-
Insurance
-
300 - 400 Employee
-
Cyber Security Operations Manager
-
Nov 2019 - Jan 2020
- Managing the cyber security operation of Infrastructure, SOC/TH, VAPT and DFIR. - Develop all needed process and procedure of cyber security operations. - Assess and engage with third party/ vendor for security solutions. - Help the CISO to met cyber security framework requirements(NIST,SAMA and NCA). - Working with risk management to met the risk management framework requirements. - Provide recommendations to CISO on term of DFIR,SOC, threat intelligence and incident handling with creating executive report for each. Show less
-
-
-
solutions by stc
-
Saudi Arabia
-
IT Services and IT Consulting
-
700 & Above Employee
-
Cyber Security Expert
-
Nov 2018 - Nov 2019
Technical lead of digital forensics and compromise assessment projects.Managing and building digital forensics lab with ISO/IEC 17025.Provide consultation for best practice of digital forensics and incident response to our clients include solutions, software/hardware tools, process and procedure.Conduct host forensics, network forensics, log analysis, and malware triage in support of incident response investigations.Threat hunting by using security solutions, threat Intelligence platform and scripting. Show less
-
-
DFIR | Malware Analyst
-
Apr 2018 - Oct 2018
Conduct digital forensics process and procedure as technical (include evidence seizure, computer forensic analysis, network forensics and data recovery).Reverse-engineer compiled executable code to examine how programs interact with their environment.Perform malware analysis and reverse engineering, as needed in support of the resolution of security incidents.Create in depth and high level reports based on findings.Verbally brief senior management on findings.Assist with incident response tasks and ensure removal of all malware related artifacts.Coordinate with other teams, organizations, customers and ensure that everyone is up to date at all times.Assist with insider threat, cyber intelligence and soc tasks.Evidence inventory and proper chain of custody management. Show less
-
-
Cyber Security Engineer
-
Mar 2017 - Mar 2018
What is Red Team & Blue Team doing usually.- Incident Handling.- Forensics Analysis.- Security Enhancement.- Configuration Review- Vulnerability assessment.- Penetration testing.So, That makes me the purple one.
-
-
-
Elm Company
-
Saudi Arabia
-
IT Services and IT Consulting
-
700 & Above Employee
-
Security Analyst
-
Apr 2016 - Feb 2017
Security monitoring and monitoring the environment for alertsConducts computer investigations.Responds and/or mitigates security breaches and attacks to the infrastructure.Conducts vulnerability and threat analysis for the environment.Incident Response: Demonstrates the ability to respond quickly to reports from individuals. Takes immediate action to stop an incident from continuing or recurring. Determines whether an incident should be handled locally or reported to IT Teams. Works with the IT support staff to repair a system, restore service, and preserve evidence of the incident. Handles sensitive and other critical responses in a professional manner. Evaluates and documents investigation findings after resolving an incident.Network Forensics: Possesses sufficient fundamental proficiency to successfully demonstrate Network Forensics in practical applications of moderate difficulty.◦Anomaly Detection: Possesses sufficient fundamental proficiency to successfully demonstrate Anomaly Detection practices in practical applications of moderate difficulty. Has a basic understanding of network behavior analysis techniques and tools. Capable of using Intrusion Detection Systems software.Cyber Threat Intelligence. Show less
-
-
Junior Security Analyst
-
Jun 2014 - Mar 2016
Security monitoring and monitoring the environment for alertsAnalyses the structure and stability of a company's computer network.Sets up alert systems to detect security breaches.Addresses any warning signs, hacking issues, or other network security problems.Works to close security breach as soon as possible.Identifies and analyses sources of breach.Troubleshoots any glitches or problems with network security programs.Makes client visits to perform on-site analysis or maintenance of security systems.Maintains logs and writes reports regarding information security activity. Show less
-
-
-
Ministry of Education,Riyadh,KSA
-
Saudi Arabia
-
Higher Education
-
100 - 200 Employee
-
System Specialist and Training
-
Nov 2013 - Jun 2014
Project coordinator. Train new employee on the systems. System Analysis. Project coordinator. Train new employee on the systems. System Analysis.
-
-
-
King Abdulaziz City for Science and Technology (KACST)
-
Saudi Arabia
-
Research Services
-
700 & Above Employee
-
Programmer training
-
May 2013 - Aug 2013
I was required to deliver HR Application with features: Check for department tasks and status. Payrolls balance portal. Track all projects with status. Link all HR process with database management. I was required to deliver HR Application with features: Check for department tasks and status. Payrolls balance portal. Track all projects with status. Link all HR process with database management.
-
-
Education
-
Swiss School of Business and Management
Executive MBA, Cybersecurity Management -
Al-Imam Muhammad Ibn Saud Islamic University
Bachelor's degree, Computer Science