Osamah Almatari

Lecturer at University of Science and Technology, Yemen
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
Sana‘a, Yemen, YE

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • ISO 27001 Foundation - Information Security Certification
    ISO - International Organization for Standardization
    Aug, 2022
    - Oct, 2024
  • Artificial Intelligence in Finance
    Digital Frontiers Institute
    Apr, 2022
    - Oct, 2024
  • ISO 27001 Foundation - Information Security Certification
    PECB
    Apr, 2021
    - Oct, 2024
  • EC-Council Certified Security Analyst: Penetration Testing (ECSA)
    EC-Council
    Feb, 2013
    - Oct, 2024
  • Certified Ethical Hacker (CEH)
    EC-Council
    Jan, 2013
    - Oct, 2024
  • Microsoft Certified Solutions Associate (MCSA)
    Microsoft
    Dec, 2012
    - Oct, 2024
  • Certified Information Systems Auditor (CISA)
    ISACA
    Jun, 2023
    - Oct, 2024

Experience

    • Lecturer
      • Dec 2022 - Present

      Teaching set of courses such as cloud computing and cloud security. Teaching set of courses such as cloud computing and cloud security.

    • Yemen
    • Banking
    • 100 - 200 Employee
    • Head of IT Audit
      • Apr 2022 - Present

      Oversee the internal control of our audit review procedures and processes.Work closely with other members of the auditing team, including a senior auditor, junior auditor, and external auditor.Review security systems and procedures for potential opportunities for future security breaches and provide information security analysis.Provide multiple types of audits and internal auditing. Including technological innovation process auditors, innovative comparison audits, technological audits, systems and application audits, and management of IT and enterprise architecture audits.Review client, server, and telecommunication systems as well as general operating procedures.Work closely with an audit manager to generate an audit report based on audit findings for the management team.Follow internal audit procedures set by the audit manager. Show less

    • Head of IT Risk Management
      • Oct 2020 - Apr 2022

      Play a key role in overseeing the use of technology within a Bank. My role includes identifying potential risks and developing protocols that staff must follow to reduce or manage those risks. Part of my job involves ensuring that IT systems are structured in a way that is effective for the Bank's business goals. monitor the IT systems to ensure that they are secure, and, if an attack occurs, it is my responsibility to make sure that the systems are not breached.My roles are not simply focused on external threats to data. I manage all relevant risk factors, such as the risk of a system failure or loss of data. Also consider things such as reputation risk and may play an active role in creating and implementing policies that are designed to demonstrate compliance with industry regulations. The specific nature of the risks that an IT risk manager handles may vary from industry to industry. Show less

    • Lecturer
      • Apr 2020 - Apr 2021

      Network security Network security

  • Saba University
    • Sana'a, Yemen
    • Lecturer
      • Dec 2019 - Apr 2021

       Information systems and security Frameworks  Database and Big data.  Information System Enterprise Architectures  Cyber security controls  Change & Configuration Management  Information systems and security Frameworks  Database and Big data.  Information System Enterprise Architectures  Cyber security controls  Change & Configuration Management

  • Sana'a University
    • Sana‘a, Yemen
    • Network Supervisor
      • Dec 2019 - Apr 2021

  • Cairo University
    • Cairo Governorate, Egypt
    • Researcher in Cyber security
      • Mar 2016 - Jul 2019

      • Dissertation with title (Framework for an Integrated Tool for Auditing and Controlling Information Systems Cyber Security). • Published researches:- 1) Cyber Security Tools for IS Auditing. 2) Integrated Framework for Cyber Security Auditing. 3) Adopting Security Maturity Model to the Organizations' Capability Model. 4) Security Management Techniques and Tools for IS Auditing • Dissertation with title (Framework for an Integrated Tool for Auditing and Controlling Information Systems Cyber Security). • Published researches:- 1) Cyber Security Tools for IS Auditing. 2) Integrated Framework for Cyber Security Auditing. 3) Adopting Security Maturity Model to the Organizations' Capability Model. 4) Security Management Techniques and Tools for IS Auditing

    • Cyber Security Consultant
      • Apr 2013 - Oct 2017

      • Knowledge on designing the network security architectures through 7 layers such as firewalls, IDS, IPS, routers and switches L2, 3.  Knowledge on cisco DNA center and sonar appliances such, remedies the issues of any network device and mange switches and routers performance.  Securing applications OWASP Top 10 vulnerabilities.  Risk Identification, Assessment, Response and Mitigation  Risk Control Monitoring and Reporting  Pen testing/ethical hacking of networks, systems and applications; network/system forensics; security auditing; and security architecture.  Monitor and carry out the standards and frameworks such as ISO, PCI DSS, CBK, NIST and CSC/SAN.  Disaster recovery, computer forensic tools, technologies and methods.  Planning, researching and developing security policies, standards and procedures.  Maintain firewall rules and perform regular security sweeps for new vulnerabilities.  Participate in the annual budget planning and ensure allocation for the necessary IT investments to acquire the required infrastructure that corresponds to the business needs.  Maintaining awareness of the latest security risks, exploits, and vulnerabilities and maintaining up to date security.  Development and maintenance of a network security policy and training technical staff on the usage of security and networking tools.  Perform threat modeling, secure feature and architecture assessments, securitycritical code reviews, and penetration testing.  Monitor alerts produced by security tools ensuring appropriate response and mitigation.  Manage the End-to-End design and implementation of the tooling/ controls/ configuration to secure the operating platform  Using more than 70 cyber security tools and techniques.  A knowledge on how to assess the vulnerabilities for IT/OT with ICS Technologies.  Maintaining awareness of the latest security risks, exploits, and vulnerabilities and maintaining up to date security. Show less

    • System Admin
      • Apr 2010 - Mar 2013

      • Database Admin (Tablespec & Relations) Oracle and SQL server. • Installing, configuring and managing interfaces of VMware vSphere ESXi, vCenter and Hyper-v with DRS and fault tolerance. • Installing and configuring MS Exchange Server. • Run reports on system performance for team and wider organization. • Optimize processes and lead process improvement. • Manage staff and user credentials and frameworks. • Troubleshoot technical issues & Create and implement training for staff. • Coordinate and provide support for Firewall and network system. • Ensure systems are secure and protected from breach or viruses. • Risk mitigation planning Provides updates on projects regarding relevant changes and ensures all documentation is maintained and completed. • Implementing Active Directory, DNS, DHCP and GPO. • Administrate infrastructure, including firewalls, databases, malware protection software and other processes • Sophos XG, Palo Alto and cyberoam firewalls Install and configure with unified threat management and traffics control for active directory. • A good Knowledge in firewalls products such as F5 and Fortinet. • A good Knowledge in system analysis with Agile and scram methods. • Interact with Programs, Operations and field offices to ensure understanding of business needs and efficient support is delivered. • System administration, supporting multiple platforms and applications. • Manage installation, configuration, maintenance, repair, security and documentation of local area networks, servers, desktop/laptop computers, communication resources and other office equipment. Show less

  • BROTHER’S PC
    • Sana'a , Yemen
    • IT Assistant
      • Jun 2007 - Feb 2010

      • Install and configure new computer hardware for improving and upgrading system performance; support any technology upgrades as required. • Manages IT systems and initiatives to establish, implement and maintain client-focused IT services throughout the Department. • Ensures that the development of all IT projects utilize appropriate, supportable, sustainable platforms and technologies. • Manipulating, cleansing & processing data using Excel, Access, and SQL. • Perform routine PC maintenance and updates for performance efficiency. • Supervise and process help desk support requests. • Assist in maintaining Internet service, firewalls, and telephone systems. • Initiate process improvements to better answer user demands. • Analyzing and managing data by MS Excel with pivot table’s techniques. • Using R language and SPSS for analyzing data. Show less

Education

  • Southwest Jiaotong University
    Doctor of Philosophy - PhD.Candidate, Computer Sciences and Artificial Intelligence
    2020 - 2024
  • Cairo University
    Master's degree, Computer and Information Systems Security/Information Assurance
    2016 - 2019
  • Sana'a University
    Bachelor's degree, Information Systems
    2005 - 2009

Community

You need to have a working account to view this content. Click here to join now