Eghbal Ghazizadeh

Group Information Security Manager at Mercury NZ
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
NZ
Languages
  • English Professional working proficiency
  • Kurdish Native or bilingual proficiency
  • Persian Native or bilingual proficiency
  • Arabic Elementary proficiency

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

5.0

/5.0
/ Based on 2 ratings
  • (2)
  • (0)
  • (0)
  • (0)
  • (0)

Filter reviews by:

Ali Ash ☁

Eghbal is great to work with: smart, innovative and confident. He is very reliable and got expertise and experience in a broad range of contexts and will do his best work in any and every situation. He is also proactive in anticipating the rising needs and takes initiative to go sometimes beyond the expected parameter of his job.

LinkedIn User

Worked with Eghbal at ICA, from day one he stepped in to onboard and introduce me to the team. He is a very friendly, helpful and pleasant to work with. His technical experience in cloud architecture and cyber security makes him very special and you always want to listen and learn from. Very positive in nature and works hard to meet the deadlines. Definitely an asset to any organization.

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • Microsoft Certified: Security, Compliance, and Identity Fundamentals
    Microsoft
    Dec, 2021
    - Nov, 2024
  • Microsoft Certified: Azure Fundamentals
    Microsoft
    Sep, 2020
    - Nov, 2024
  • Certified Information Security Manager (CISM)
    ISACA
    Feb, 2020
    - Nov, 2024
  • Linux
    LinuxTrainingAcademy Udemy
    Dec, 2015
    - Nov, 2024
  • Information Security Management System lead Auditor
    United States Accreditation Services
    Jan, 2015
    - Nov, 2024
  • Teacher Assistant
    Auckland University of Technology
    Jan, 2015
    - Nov, 2024
  • VMware ESXi and vSphere Admin
    Infinite Skills Inc, Udemy
    Jan, 2015
    - Nov, 2024
  • Information security management system Auditor / Lead Auditor in accordance with ISO/IEC 27001:2013
    ICS Group
    Jan, 2014
    - Nov, 2024
  • Information security management system Requirements and Implementation in accordance with ISO/IEC 27001:2013
    ICS Group
    Jan, 2014
    - Nov, 2024
  • MikroTik Certified Network Associate
    Mikrotik
    Jan, 2013
    - Nov, 2024
  • CEH
    EC-Council
    Jan, 2012
    - Nov, 2024
  • IBM Certified Solution Advisor - Cloud Computing Architecture V4
    IBM
    Jan, 2012
    - Nov, 2024
  • CCNA
    Universiti Teknologi Malaysia
    Jan, 2011
    - Nov, 2024
  • CA Manager
    Amozesh Bazargani Institute
    Jan, 2008
    - Nov, 2024
  • MCSE
    Farzanegan Institute
    Jan, 2007
    - Nov, 2024
  • OneTrust Certified Privacy Professional
    OneTrust
    May, 2021
    - Nov, 2024
  • Dragos Platform Certified User
    Dragos, Inc.
    Jul, 2022
    - Nov, 2024
  • AWS Certified Cloud Practitioner
    Amazon Web Services (AWS)
    Mar, 2021
    - Nov, 2024
  • Microsoft Certified: Cybersecurity Architect Expert
    Microsoft
    Dec, 2022
    - Nov, 2024
  • Microsoft Certified: Azure Security Engineer Associate
    Microsoft
    Feb, 2021
    - Nov, 2024
  • Microsoft Certified: Security Operations Analyst Associate
    Microsoft
    Nov, 2021
    - Nov, 2024
  • OneTrust Incident Response Management Expert
    OneTrust
    Sep, 2021
    - Nov, 2024
  • OneTrust Certified GRC Professional
    OneTrust
    Jul, 2021
    - Nov, 2024

Experience

    • New Zealand
    • Utilities
    • 700 & Above Employee
    • Group Information Security Manager
      • Oct 2021 - Present

      -Providing information security thought leadership-Communicate the information security vision-Establishing and maintaining effective information security governance-Defining and delivering the information security strategy and framework-Definition and delivering a continuous information security programme-Providing the information security operational support-Implement and maintain an effective assurance framework-Part of the ICT leadership team

    • Technical Lead Enterprise Security & Technology Risk
      • Mar 2021 - Oct 2021

      -Leading the Enterprise Security & Technology Risk Manager, -Contribute and help shape the technical security constructs across both Information Communication Technologies (ICT) and Operational Technologies (OT) environments at Mercury. -Contribute and help in alignment with Mercury’s Information Security Plan, lead technical security discussions across multiple domains; -Help provide clarity and technical leadership to security programmes of work, projects and initiatives across Mercury.

    • New Zealand
    • Higher Education
    • 1 - 100 Employee
    • Trainer
      • Nov 2020 - Feb 2021

      Trainer for Information Security Management System (COBIT 5, ISO, CSA Star, NZISM & PSR, HIPPA, PCI DSS, and CIS) Project Management (PMP & Agile) Digital Transformation (AI, Blockchain, Cloud Computing and IoT) Trainer for Information Security Management System (COBIT 5, ISO, CSA Star, NZISM & PSR, HIPPA, PCI DSS, and CIS) Project Management (PMP & Agile) Digital Transformation (AI, Blockchain, Cloud Computing and IoT)

    • New Zealand
    • Higher Education
    • 200 - 300 Employee
    • Trainer
      • Aug 2019 - Dec 2020

      Cloud Computing Cyber Security Network Design and Management Future Generation of IT Cloud Computing Cyber Security Network Design and Management Future Generation of IT

    • New Zealand
    • Higher Education
    • 700 & Above Employee
    • Researcher (Cloud Security Architect)
      • May 2015 - Dec 2020

      Analyse Best practices and Cloud Security Architecture (Azure, AWS, IBM) Design and Develop Cloud Identity Security Architecture (Azure, AWS, IBM) Analyse Trust Computing and Functional Security Requirement Build Cloud Identity Guidelines Develop Knowledge Base Decision Making based on AHP and IPA Theory Analyse Cloud Standards and Guidelines (ENISA, NIST, ISO, CSA) Build Unique Trust as a Service (TaaS) for Cloud Identity Users Analyse Security Architecture Compliance (Zachman and Togaf) Analyse Software Requirement Engineering (Agile) Analyse Contemporary Information System (RAD, JAD, STRAIDS, and Yourdon) Analyse IT strategy and Control (ITIL, ISO, SOC, NZISM, ITAF, Val IT, and COBIT) Technology Integration (ERP), Argenta Manufacturing Limited Design Security Architect for IoT Data Mask (ANZ) Build prototype and Novel Architecture for Bank Sector (Transaction) By Integrating Blockchain with Cloud architecture (ANZ)

    • New Zealand
    • IT Services and IT Consulting
    • Information Security & Data Protection Consultant
      • Feb 2018 - Dec 2019

      I work as an IT Security and Data Protection Consultant at InfoSecCo, an independent firm that provides security and privacy consulting services to small to medium organisations across different industries. We work as virtual CISOs, and take care of companies that has similar needs for security management & support. My specialties include: " Privacy Impact Assessment (PIA)/ Data Protection Impact Assessment (DPIA) " GDPR preparation review " Security Management (ISO27001, NZISM, NIST) " Security risk assessments " Auditing (ITIL, COBIT) " Cyber Security Threat Analysis

    • United States
    • IT Services and IT Consulting
    • 300 - 400 Employee
    • AUT-ISG treasurer
      • Jun 2015 - Dec 2019

      ISACA Student Group (ISG) encourage education beyond the classroom by allowing students to network and learn from each other, and connect with a supportive group of professionals. While ISG do NOT require ISACA Student Membership, an ISG gives students the opportunity to get to know ISACA by interacting with professionals at events sponsored by the university and the local chapter. By participating in an ISG, students gain knowledge and experience that moves them ahead of the competition when they graduate. http://aut-isg.com/

    • Information Security Architect
      • Jan 2013 - May 2015

      Identify design gaps and recommend security enhancements Establish a strategic security architecture vision Provide technical leadership and guidance Establish a weekly group discussion to address technical challenges and project status Translate architectures, predicting and planning for the future of IT ecosystems Develop technical proposals including governance, risk and compliance framework, security awareness program, ISMS implementation, risk assessment, security assessment, security strategy Advise upon and coordinate technical and operational requirements for projects and BAU initiatives working Identify Cyber Security Roadmap Plan, apply and promote security actions and controls Define requirements and assess solutions to automate and continuously improve the efficiency of threat detection, alerting and response. Work with security vendors to ensure the products used are maintained and enhanced to fully meet changing operational requirements. Develop security reference architecture and standard templates Train staff in security alertness and measures Lead Cyber Security incident response activities Assess and recommend improvements to network operations and integrated hardware, software, communications and operating systems (ISO, NIST, CIS, and ITIL) Raise skill deficits and propose technical training

    • Malaysia
    • Research Services
    • 700 & Above Employee
    • Associate Researcher
      • 2011 - 2013

       Develop Identity and Access Management Architecture  Analyse and develop Information Security Architecture  Build Federated architecture to mitigate identity theft based on Trusted Computing (TPM)  Develop Identity and Access Management Architecture  Analyse and develop Information Security Architecture  Build Federated architecture to mitigate identity theft based on Trusted Computing (TPM)

    • Principal Systems and Network Engineer
      • 2001 - 2011

      Lead identity and access management (Active Directory, Radius, MFA) Manage and maintain UTM and Firewall (Astrao, Fortinet, McAfee, Kaspersky, Quick Heal, Symantec) Design and build Cloud Solutions (VMware, Windows, Linux) Manage and maintain Cisco and Mikrotik routing and switching Troubleshoot and tune a network of servers to include application and Windows terminal servers Design and build network (Optical Fiber, Cable, and Wireless) (LAN, MAN, WAN, VOIP) Implement NAS and SAN technologies Manage and maintain IT Infrastructure (HP, Qnap, Huawei, TP-Link, D-Link) Manage and maintain all infrastructure services (Event, Problem, and Incident management) Deploy and Maintain VSAT connection Utilise VMware (V-motion, High availability, Access Control, SSO, Update Manager, Data protection) Assist the organisation in proposal evaluation and vendor selection processes Ensure organisation security policies are in place and current

Education

  • Auckland University of Technology
    Doctor of Philosophy - PhD, Cloud Access Security Broker
    2015 - 2018
  • Universiti Teknologi Malaysia
    Master of Computer Science, Computer and Information Systems Security/Information Assurance
    2011 - 2013
  • Shahid Beheshti University
    Bachelor's of Computer, Computer Hardware Engineering
    1996 - 2001

Community

You need to have a working account to view this content. Click here to join now