Eghbal Ghazizadeh
Group Information Security Manager at Mercury NZ- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
-
English Professional working proficiency
-
Kurdish Native or bilingual proficiency
-
Persian Native or bilingual proficiency
-
Arabic Elementary proficiency
Topline Score
Bio
Ali Ash ☁
Eghbal is great to work with: smart, innovative and confident. He is very reliable and got expertise and experience in a broad range of contexts and will do his best work in any and every situation. He is also proactive in anticipating the rising needs and takes initiative to go sometimes beyond the expected parameter of his job.
LinkedIn User
Worked with Eghbal at ICA, from day one he stepped in to onboard and introduce me to the team. He is a very friendly, helpful and pleasant to work with. His technical experience in cloud architecture and cyber security makes him very special and you always want to listen and learn from. Very positive in nature and works hard to meet the deadlines. Definitely an asset to any organization.
Ali Ash ☁
Eghbal is great to work with: smart, innovative and confident. He is very reliable and got expertise and experience in a broad range of contexts and will do his best work in any and every situation. He is also proactive in anticipating the rising needs and takes initiative to go sometimes beyond the expected parameter of his job.
LinkedIn User
Worked with Eghbal at ICA, from day one he stepped in to onboard and introduce me to the team. He is a very friendly, helpful and pleasant to work with. His technical experience in cloud architecture and cyber security makes him very special and you always want to listen and learn from. Very positive in nature and works hard to meet the deadlines. Definitely an asset to any organization.
Ali Ash ☁
Eghbal is great to work with: smart, innovative and confident. He is very reliable and got expertise and experience in a broad range of contexts and will do his best work in any and every situation. He is also proactive in anticipating the rising needs and takes initiative to go sometimes beyond the expected parameter of his job.
LinkedIn User
Worked with Eghbal at ICA, from day one he stepped in to onboard and introduce me to the team. He is a very friendly, helpful and pleasant to work with. His technical experience in cloud architecture and cyber security makes him very special and you always want to listen and learn from. Very positive in nature and works hard to meet the deadlines. Definitely an asset to any organization.
Ali Ash ☁
Eghbal is great to work with: smart, innovative and confident. He is very reliable and got expertise and experience in a broad range of contexts and will do his best work in any and every situation. He is also proactive in anticipating the rising needs and takes initiative to go sometimes beyond the expected parameter of his job.
LinkedIn User
Worked with Eghbal at ICA, from day one he stepped in to onboard and introduce me to the team. He is a very friendly, helpful and pleasant to work with. His technical experience in cloud architecture and cyber security makes him very special and you always want to listen and learn from. Very positive in nature and works hard to meet the deadlines. Definitely an asset to any organization.
Credentials
-
Microsoft Certified: Security, Compliance, and Identity Fundamentals
MicrosoftDec, 2021- Nov, 2024 -
Microsoft Certified: Azure Fundamentals
MicrosoftSep, 2020- Nov, 2024 -
Certified Information Security Manager (CISM)
ISACAFeb, 2020- Nov, 2024 -
Linux
LinuxTrainingAcademy UdemyDec, 2015- Nov, 2024 -
Information Security Management System lead Auditor
United States Accreditation ServicesJan, 2015- Nov, 2024 -
Teacher Assistant
Auckland University of TechnologyJan, 2015- Nov, 2024 -
VMware ESXi and vSphere Admin
Infinite Skills Inc, UdemyJan, 2015- Nov, 2024 -
Information security management system Auditor / Lead Auditor in accordance with ISO/IEC 27001:2013
ICS GroupJan, 2014- Nov, 2024 -
Information security management system Requirements and Implementation in accordance with ISO/IEC 27001:2013
ICS GroupJan, 2014- Nov, 2024 -
MikroTik Certified Network Associate
MikrotikJan, 2013- Nov, 2024 -
CEH
EC-CouncilJan, 2012- Nov, 2024 -
IBM Certified Solution Advisor - Cloud Computing Architecture V4
IBMJan, 2012- Nov, 2024 -
CCNA
Universiti Teknologi MalaysiaJan, 2011- Nov, 2024 -
CA Manager
Amozesh Bazargani InstituteJan, 2008- Nov, 2024 -
MCSE
Farzanegan InstituteJan, 2007- Nov, 2024 -
OneTrust Certified Privacy Professional
OneTrustMay, 2021- Nov, 2024 -
Dragos Platform Certified User
Dragos, Inc.Jul, 2022- Nov, 2024 -
AWS Certified Cloud Practitioner
Amazon Web Services (AWS)Mar, 2021- Nov, 2024 -
Microsoft Certified: Cybersecurity Architect Expert
MicrosoftDec, 2022- Nov, 2024 -
Microsoft Certified: Azure Security Engineer Associate
MicrosoftFeb, 2021- Nov, 2024 -
Microsoft Certified: Security Operations Analyst Associate
MicrosoftNov, 2021- Nov, 2024 -
OneTrust Incident Response Management Expert
OneTrustSep, 2021- Nov, 2024 -
OneTrust Certified GRC Professional
OneTrustJul, 2021- Nov, 2024
Experience
-
Mercury NZ
-
New Zealand
-
Utilities
-
700 & Above Employee
-
Group Information Security Manager
-
Oct 2021 - Present
-Providing information security thought leadership-Communicate the information security vision-Establishing and maintaining effective information security governance-Defining and delivering the information security strategy and framework-Definition and delivering a continuous information security programme-Providing the information security operational support-Implement and maintain an effective assurance framework-Part of the ICT leadership team
-
-
Technical Lead Enterprise Security & Technology Risk
-
Mar 2021 - Oct 2021
-Leading the Enterprise Security & Technology Risk Manager, -Contribute and help shape the technical security constructs across both Information Communication Technologies (ICT) and Operational Technologies (OT) environments at Mercury. -Contribute and help in alignment with Mercury’s Information Security Plan, lead technical security discussions across multiple domains; -Help provide clarity and technical leadership to security programmes of work, projects and initiatives across Mercury.
-
-
-
ICL Education Group
-
New Zealand
-
Higher Education
-
1 - 100 Employee
-
Trainer
-
Nov 2020 - Feb 2021
Trainer for Information Security Management System (COBIT 5, ISO, CSA Star, NZISM & PSR, HIPPA, PCI DSS, and CIS) Project Management (PMP & Agile) Digital Transformation (AI, Blockchain, Cloud Computing and IoT) Trainer for Information Security Management System (COBIT 5, ISO, CSA Star, NZISM & PSR, HIPPA, PCI DSS, and CIS) Project Management (PMP & Agile) Digital Transformation (AI, Blockchain, Cloud Computing and IoT)
-
-
-
Whitireia Community Polytechnic
-
New Zealand
-
Higher Education
-
200 - 300 Employee
-
Trainer
-
Aug 2019 - Dec 2020
Cloud Computing Cyber Security Network Design and Management Future Generation of IT Cloud Computing Cyber Security Network Design and Management Future Generation of IT
-
-
-
Auckland University of Technology
-
New Zealand
-
Higher Education
-
700 & Above Employee
-
Researcher (Cloud Security Architect)
-
May 2015 - Dec 2020
Analyse Best practices and Cloud Security Architecture (Azure, AWS, IBM) Design and Develop Cloud Identity Security Architecture (Azure, AWS, IBM) Analyse Trust Computing and Functional Security Requirement Build Cloud Identity Guidelines Develop Knowledge Base Decision Making based on AHP and IPA Theory Analyse Cloud Standards and Guidelines (ENISA, NIST, ISO, CSA) Build Unique Trust as a Service (TaaS) for Cloud Identity Users Analyse Security Architecture Compliance (Zachman and Togaf) Analyse Software Requirement Engineering (Agile) Analyse Contemporary Information System (RAD, JAD, STRAIDS, and Yourdon) Analyse IT strategy and Control (ITIL, ISO, SOC, NZISM, ITAF, Val IT, and COBIT) Technology Integration (ERP), Argenta Manufacturing Limited Design Security Architect for IoT Data Mask (ANZ) Build prototype and Novel Architecture for Bank Sector (Transaction) By Integrating Blockchain with Cloud architecture (ANZ)
-
-
-
InfoSecCo
-
New Zealand
-
IT Services and IT Consulting
-
Information Security & Data Protection Consultant
-
Feb 2018 - Dec 2019
I work as an IT Security and Data Protection Consultant at InfoSecCo, an independent firm that provides security and privacy consulting services to small to medium organisations across different industries. We work as virtual CISOs, and take care of companies that has similar needs for security management & support. My specialties include: " Privacy Impact Assessment (PIA)/ Data Protection Impact Assessment (DPIA) " GDPR preparation review " Security Management (ISO27001, NZISM, NIST) " Security risk assessments " Auditing (ITIL, COBIT) " Cyber Security Threat Analysis
-
-
-
ISACA
-
United States
-
IT Services and IT Consulting
-
300 - 400 Employee
-
AUT-ISG treasurer
-
Jun 2015 - Dec 2019
ISACA Student Group (ISG) encourage education beyond the classroom by allowing students to network and learn from each other, and connect with a supportive group of professionals. While ISG do NOT require ISACA Student Membership, an ISG gives students the opportunity to get to know ISACA by interacting with professionals at events sponsored by the university and the local chapter. By participating in an ISG, students gain knowledge and experience that moves them ahead of the competition when they graduate. http://aut-isg.com/
-
-
-
-
Information Security Architect
-
Jan 2013 - May 2015
Identify design gaps and recommend security enhancements Establish a strategic security architecture vision Provide technical leadership and guidance Establish a weekly group discussion to address technical challenges and project status Translate architectures, predicting and planning for the future of IT ecosystems Develop technical proposals including governance, risk and compliance framework, security awareness program, ISMS implementation, risk assessment, security assessment, security strategy Advise upon and coordinate technical and operational requirements for projects and BAU initiatives working Identify Cyber Security Roadmap Plan, apply and promote security actions and controls Define requirements and assess solutions to automate and continuously improve the efficiency of threat detection, alerting and response. Work with security vendors to ensure the products used are maintained and enhanced to fully meet changing operational requirements. Develop security reference architecture and standard templates Train staff in security alertness and measures Lead Cyber Security incident response activities Assess and recommend improvements to network operations and integrated hardware, software, communications and operating systems (ISO, NIST, CIS, and ITIL) Raise skill deficits and propose technical training
-
-
-
MIMOS Berhad
-
Malaysia
-
Research Services
-
700 & Above Employee
-
Associate Researcher
-
2011 - 2013
Develop Identity and Access Management Architecture Analyse and develop Information Security Architecture Build Federated architecture to mitigate identity theft based on Trusted Computing (TPM) Develop Identity and Access Management Architecture Analyse and develop Information Security Architecture Build Federated architecture to mitigate identity theft based on Trusted Computing (TPM)
-
-
-
-
Principal Systems and Network Engineer
-
2001 - 2011
Lead identity and access management (Active Directory, Radius, MFA) Manage and maintain UTM and Firewall (Astrao, Fortinet, McAfee, Kaspersky, Quick Heal, Symantec) Design and build Cloud Solutions (VMware, Windows, Linux) Manage and maintain Cisco and Mikrotik routing and switching Troubleshoot and tune a network of servers to include application and Windows terminal servers Design and build network (Optical Fiber, Cable, and Wireless) (LAN, MAN, WAN, VOIP) Implement NAS and SAN technologies Manage and maintain IT Infrastructure (HP, Qnap, Huawei, TP-Link, D-Link) Manage and maintain all infrastructure services (Event, Problem, and Incident management) Deploy and Maintain VSAT connection Utilise VMware (V-motion, High availability, Access Control, SSO, Update Manager, Data protection) Assist the organisation in proposal evaluation and vendor selection processes Ensure organisation security policies are in place and current
-
-
Education
-
Auckland University of Technology
Doctor of Philosophy - PhD, Cloud Access Security Broker -
Universiti Teknologi Malaysia
Master of Computer Science, Computer and Information Systems Security/Information Assurance -
Shahid Beheshti University
Bachelor's of Computer, Computer Hardware Engineering