Omar Rajab

Cyber Security Consultant at Janka Technologies
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
Paris, Île-de-France, France, FR

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • ANSSI Mooc
    ANSSI - Agence nationale de la sécurité des systèmes d'information
    Dec, 2022
    - Oct, 2024
  • Certified Ethical Hacker Practical (CEH)
    EC-Council
    Apr, 2022
    - Oct, 2024
  • User Behavior Analytics
    Splunk
    Oct, 2021
    - Oct, 2024
  • CyberOps Associate
    Cisco
    May, 2021
    - Oct, 2024
  • Amazon Web Services Cloud Practitioner
    Amazon Web Services (AWS)
  • Android Malware Analysis
    Udemy
  • Certified Linux Administrator (LPIC-1)
    Linux Professional Institute
  • Cisco Certified Network Associate Industrial (CCNA I)
    Cisco
  • Cisco Certified Network Associate Routing and Switching (CCNA)
    Cisco
  • Cisco Certified Network Associate Security (CCNA)
    Cisco
  • Cisco ITE
    Cisco
  • HTML
    SoloLearn

Experience

    • France
    • Technology, Information and Internet
    • 1 - 100 Employee
    • Cyber Security Consultant
      • Feb 2023 - Present

      Orchestrated and optimized security operations, implementing robust protocols and conducting regular risk assessments to fortify the organization's digital infrastructure against potential threats. Spearheaded reverse engineering efforts, dissecting malware and deciphering complex systems to develop targeted countermeasures, contributing significantly to the enhancement of the overall cybersecurity posture. Proactively engaged in threat intelligence activities, gathering… Show more Orchestrated and optimized security operations, implementing robust protocols and conducting regular risk assessments to fortify the organization's digital infrastructure against potential threats. Spearheaded reverse engineering efforts, dissecting malware and deciphering complex systems to develop targeted countermeasures, contributing significantly to the enhancement of the overall cybersecurity posture. Proactively engaged in threat intelligence activities, gathering, analyzing, and interpreting data from diverse sources to identify and mitigate potential security risks, ensuring a proactive defense against emerging threats. Collaborated with cross-functional teams to establish and enforce security policies, staying current with industry best practices to continually elevate the organization's cybersecurity standards. Took charge of security incident response, coordinating timely and effective actions to mitigate and recover from security incidents, demonstrating a decisive and strategic approach in crisis situations. Provided comprehensive and insightful security reports for clients, translating complex technical information into easily understandable insights, fostering client understanding and satisfaction. Show less Orchestrated and optimized security operations, implementing robust protocols and conducting regular risk assessments to fortify the organization's digital infrastructure against potential threats. Spearheaded reverse engineering efforts, dissecting malware and deciphering complex systems to develop targeted countermeasures, contributing significantly to the enhancement of the overall cybersecurity posture. Proactively engaged in threat intelligence activities, gathering… Show more Orchestrated and optimized security operations, implementing robust protocols and conducting regular risk assessments to fortify the organization's digital infrastructure against potential threats. Spearheaded reverse engineering efforts, dissecting malware and deciphering complex systems to develop targeted countermeasures, contributing significantly to the enhancement of the overall cybersecurity posture. Proactively engaged in threat intelligence activities, gathering, analyzing, and interpreting data from diverse sources to identify and mitigate potential security risks, ensuring a proactive defense against emerging threats. Collaborated with cross-functional teams to establish and enforce security policies, staying current with industry best practices to continually elevate the organization's cybersecurity standards. Took charge of security incident response, coordinating timely and effective actions to mitigate and recover from security incidents, demonstrating a decisive and strategic approach in crisis situations. Provided comprehensive and insightful security reports for clients, translating complex technical information into easily understandable insights, fostering client understanding and satisfaction. Show less

    • United States
    • Computer and Network Security
    • 700 & Above Employee
    • Cyber Security Instructor & Content Creator
      • Dec 2022 - Present

      • Creating cybersecurity courses • Developing exercises for students • Coordinating with the content creation team • Managing the courses • Creating cybersecurity courses • Developing exercises for students • Coordinating with the content creation team • Managing the courses

    • Business Consulting and Services
    • 700 & Above Employee
    • Cyber Security Instructor
      • Mar 2023 - Mar 2023

      • Delivered Penetration Testing Course (36 Hours) • Developing exercises for students • Coordinating with the content creation team • Managing the course • Delivered Penetration Testing Course (36 Hours) • Developing exercises for students • Coordinating with the content creation team • Managing the course

    • France
    • Computer and Network Security
    • 300 - 400 Employee
    • Cyber Security Analyst
      • Apr 2022 - Feb 2023

      • Capable of working independently and involving senior analysts as necessary • Communicate the severity of the threat and recommendations for remediation to the customer and other cyber security personnel through written and verbal media • Follow detailed processes and procedures to analyze, escalate, and assist in remediation of critical information security incidents • Configuring and monitoring Security Information and Event Management (SIEM) platform for security alerts. Integrate… Show more • Capable of working independently and involving senior analysts as necessary • Communicate the severity of the threat and recommendations for remediation to the customer and other cyber security personnel through written and verbal media • Follow detailed processes and procedures to analyze, escalate, and assist in remediation of critical information security incidents • Configuring and monitoring Security Information and Event Management (SIEM) platform for security alerts. Integrate and work with the firm’s Managed Security Services Provider (MSSP) services • Serve as the SOC’s initial point of contact for all users • Scan and monitor system vulnerabilities on servers and infrastructure devices using a Threat and Vulnerability security solution • Provide strategic and tactical direction and consultation on information security and compliance. Participate in security planning and analyst activities. Work in combination with IT Delivery Lead/Manager to ensure security is engaged in projects Show less • Capable of working independently and involving senior analysts as necessary • Communicate the severity of the threat and recommendations for remediation to the customer and other cyber security personnel through written and verbal media • Follow detailed processes and procedures to analyze, escalate, and assist in remediation of critical information security incidents • Configuring and monitoring Security Information and Event Management (SIEM) platform for security alerts. Integrate… Show more • Capable of working independently and involving senior analysts as necessary • Communicate the severity of the threat and recommendations for remediation to the customer and other cyber security personnel through written and verbal media • Follow detailed processes and procedures to analyze, escalate, and assist in remediation of critical information security incidents • Configuring and monitoring Security Information and Event Management (SIEM) platform for security alerts. Integrate and work with the firm’s Managed Security Services Provider (MSSP) services • Serve as the SOC’s initial point of contact for all users • Scan and monitor system vulnerabilities on servers and infrastructure devices using a Threat and Vulnerability security solution • Provide strategic and tactical direction and consultation on information security and compliance. Participate in security planning and analyst activities. Work in combination with IT Delivery Lead/Manager to ensure security is engaged in projects Show less

    • Lebanon
    • Civic and Social Organizations
    • 1 - 100 Employee
    • Cyber Security Instructor
      • Jan 2022 - Oct 2022

      • Creating cybersecurity courses • Developing exercises for students • Coordinating with the content creation team • Managing the courses • Creating cybersecurity courses • Developing exercises for students • Coordinating with the content creation team • Managing the courses

    • United Arab Emirates
    • E-learning
    • Cyber Security Content Creator
      • Aug 2021 - Oct 2022

      • Creating cybersecurity courses • Developing exercises for students • Coordinating with the content creation team • Managing the courses • Creating cybersecurity courses • Developing exercises for students • Coordinating with the content creation team • Managing the courses

    • Lebanon
    • IT Services and IT Consulting
    • 1 - 100 Employee
    • Cyber Intelligence Analyst
      • Sep 2021 - Apr 2022

      • Prepare reports to help security managers assess the effectiveness of security policies • Recommend improvements to security standards • Collect and investigate data from various resources and identify Cyber Threat TTPs (APTs) • Share your comments and suggestions with the SOC team to improve detection • Help clients review threats and confirm their exposure to cybersecurity risks, threats and likely impacts. • Provide… Show more • Prepare reports to help security managers assess the effectiveness of security policies • Recommend improvements to security standards • Collect and investigate data from various resources and identify Cyber Threat TTPs (APTs) • Share your comments and suggestions with the SOC team to improve detection • Help clients review threats and confirm their exposure to cybersecurity risks, threats and likely impacts. • Provide actionable strategic, technical and tactical cyber insights to client via (daily, weekly, monthly reports) Show less • Prepare reports to help security managers assess the effectiveness of security policies • Recommend improvements to security standards • Collect and investigate data from various resources and identify Cyber Threat TTPs (APTs) • Share your comments and suggestions with the SOC team to improve detection • Help clients review threats and confirm their exposure to cybersecurity risks, threats and likely impacts. • Provide… Show more • Prepare reports to help security managers assess the effectiveness of security policies • Recommend improvements to security standards • Collect and investigate data from various resources and identify Cyber Threat TTPs (APTs) • Share your comments and suggestions with the SOC team to improve detection • Help clients review threats and confirm their exposure to cybersecurity risks, threats and likely impacts. • Provide actionable strategic, technical and tactical cyber insights to client via (daily, weekly, monthly reports) Show less

    • United Arab Emirates
    • Computer and Network Security
    • Cyber Security Content Creator
      • Aug 2020 - Jan 2022

      • Creating cybersecurity courses • Developing exercises for students • Coordinating with the content creation team • Managing the courses • Creating cybersecurity courses • Developing exercises for students • Coordinating with the content creation team • Managing the courses

    • Cyber Security Instructor
      • May 2019 - Jan 2022

      - Providing Ethical hacking training from zero to hero - Providing Security Awareness training

    • Cyber Security Analyst and Penetration Tester
      • Jan 2019 - Jan 2022

      • Performing threat intelligence, vulnerability assessments, and penetration testing • Communicating tactical threat information to assist in defensive mitigations • Coordinating with threat intelligence analysts and partners on matters relating to collection, analysis and reporting of open source/deep web information • Conducting open-source intelligence (OSINT) Analysis • Assisting in the development of security research papers related to latest cyber-attacks and malwares… Show more • Performing threat intelligence, vulnerability assessments, and penetration testing • Communicating tactical threat information to assist in defensive mitigations • Coordinating with threat intelligence analysts and partners on matters relating to collection, analysis and reporting of open source/deep web information • Conducting open-source intelligence (OSINT) Analysis • Assisting in the development of security research papers related to latest cyber-attacks and malwares • Delivering training on Ethical Hacking Course – (Ethical hacking boot-camp for beginners)

Education

  • American University of Science and Technology
    Bachelor's degree in Information and Communication Technology, Cyber/Computer Forensics
    2017 - 2020

Community

You need to have a working account to view this content. Click here to join now