Osamah Almatari
Lecturer at University of Science and Technology, Yemen- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
Topline Score
Bio
Credentials
-
ISO 27001 Foundation - Information Security Certification
ISO - International Organization for StandardizationAug, 2022- Oct, 2024 -
Artificial Intelligence in Finance
Digital Frontiers InstituteApr, 2022- Oct, 2024 -
ISO 27001 Foundation - Information Security Certification
PECBApr, 2021- Oct, 2024 -
EC-Council Certified Security Analyst: Penetration Testing (ECSA)
EC-CouncilFeb, 2013- Oct, 2024 -
Certified Ethical Hacker (CEH)
EC-CouncilJan, 2013- Oct, 2024 -
Microsoft Certified Solutions Associate (MCSA)
MicrosoftDec, 2012- Oct, 2024 -
Certified Information Systems Auditor (CISA)
ISACAJun, 2023- Oct, 2024
Experience
-
University of Science and Technology, Yemen
-
Sana‘a, Yemen
-
Lecturer
-
Dec 2022 - Present
Teaching set of courses such as cloud computing and cloud security. Teaching set of courses such as cloud computing and cloud security.
-
-
-
Yemen Kuwait Bank (YKB)
-
Yemen
-
Banking
-
100 - 200 Employee
-
Head of IT Audit
-
Apr 2022 - Present
Oversee the internal control of our audit review procedures and processes.Work closely with other members of the auditing team, including a senior auditor, junior auditor, and external auditor.Review security systems and procedures for potential opportunities for future security breaches and provide information security analysis.Provide multiple types of audits and internal auditing. Including technological innovation process auditors, innovative comparison audits, technological audits, systems and application audits, and management of IT and enterprise architecture audits.Review client, server, and telecommunication systems as well as general operating procedures.Work closely with an audit manager to generate an audit report based on audit findings for the management team.Follow internal audit procedures set by the audit manager. Show less
-
-
Head of IT Risk Management
-
Oct 2020 - Apr 2022
Play a key role in overseeing the use of technology within a Bank. My role includes identifying potential risks and developing protocols that staff must follow to reduce or manage those risks. Part of my job involves ensuring that IT systems are structured in a way that is effective for the Bank's business goals. monitor the IT systems to ensure that they are secure, and, if an attack occurs, it is my responsibility to make sure that the systems are not breached.My roles are not simply focused on external threats to data. I manage all relevant risk factors, such as the risk of a system failure or loss of data. Also consider things such as reputation risk and may play an active role in creating and implementing policies that are designed to demonstrate compliance with industry regulations. The specific nature of the risks that an IT risk manager handles may vary from industry to industry. Show less
-
-
-
International university of Technology Twintech
-
Sana‘a, Yemen
-
Lecturer
-
Apr 2020 - Apr 2021
Network security Network security
-
-
-
Saba University
-
Sana'a, Yemen
-
Lecturer
-
Dec 2019 - Apr 2021
Information systems and security Frameworks Database and Big data. Information System Enterprise Architectures Cyber security controls Change & Configuration Management Information systems and security Frameworks Database and Big data. Information System Enterprise Architectures Cyber security controls Change & Configuration Management
-
-
-
Sana'a University
-
Sana‘a, Yemen
-
Network Supervisor
-
Dec 2019 - Apr 2021
-
-
-
Cairo University
-
Cairo Governorate, Egypt
-
Researcher in Cyber security
-
Mar 2016 - Jul 2019
• Dissertation with title (Framework for an Integrated Tool for Auditing and Controlling Information Systems Cyber Security). • Published researches:- 1) Cyber Security Tools for IS Auditing. 2) Integrated Framework for Cyber Security Auditing. 3) Adopting Security Maturity Model to the Organizations' Capability Model. 4) Security Management Techniques and Tools for IS Auditing • Dissertation with title (Framework for an Integrated Tool for Auditing and Controlling Information Systems Cyber Security). • Published researches:- 1) Cyber Security Tools for IS Auditing. 2) Integrated Framework for Cyber Security Auditing. 3) Adopting Security Maturity Model to the Organizations' Capability Model. 4) Security Management Techniques and Tools for IS Auditing
-
-
-
Reterment Organazation
-
Sana'a, Yemen
-
Cyber Security Consultant
-
Apr 2013 - Oct 2017
• Knowledge on designing the network security architectures through 7 layers such as firewalls, IDS, IPS, routers and switches L2, 3. Knowledge on cisco DNA center and sonar appliances such, remedies the issues of any network device and mange switches and routers performance. Securing applications OWASP Top 10 vulnerabilities. Risk Identification, Assessment, Response and Mitigation Risk Control Monitoring and Reporting Pen testing/ethical hacking of networks, systems and applications; network/system forensics; security auditing; and security architecture. Monitor and carry out the standards and frameworks such as ISO, PCI DSS, CBK, NIST and CSC/SAN. Disaster recovery, computer forensic tools, technologies and methods. Planning, researching and developing security policies, standards and procedures. Maintain firewall rules and perform regular security sweeps for new vulnerabilities. Participate in the annual budget planning and ensure allocation for the necessary IT investments to acquire the required infrastructure that corresponds to the business needs. Maintaining awareness of the latest security risks, exploits, and vulnerabilities and maintaining up to date security. Development and maintenance of a network security policy and training technical staff on the usage of security and networking tools. Perform threat modeling, secure feature and architecture assessments, securitycritical code reviews, and penetration testing. Monitor alerts produced by security tools ensuring appropriate response and mitigation. Manage the End-to-End design and implementation of the tooling/ controls/ configuration to secure the operating platform Using more than 70 cyber security tools and techniques. A knowledge on how to assess the vulnerabilities for IT/OT with ICS Technologies. Maintaining awareness of the latest security risks, exploits, and vulnerabilities and maintaining up to date security. Show less
-
-
-
Retierment Organzation
-
Sana'a, Yemen
-
System Admin
-
Apr 2010 - Mar 2013
• Database Admin (Tablespec & Relations) Oracle and SQL server. • Installing, configuring and managing interfaces of VMware vSphere ESXi, vCenter and Hyper-v with DRS and fault tolerance. • Installing and configuring MS Exchange Server. • Run reports on system performance for team and wider organization. • Optimize processes and lead process improvement. • Manage staff and user credentials and frameworks. • Troubleshoot technical issues & Create and implement training for staff. • Coordinate and provide support for Firewall and network system. • Ensure systems are secure and protected from breach or viruses. • Risk mitigation planning Provides updates on projects regarding relevant changes and ensures all documentation is maintained and completed. • Implementing Active Directory, DNS, DHCP and GPO. • Administrate infrastructure, including firewalls, databases, malware protection software and other processes • Sophos XG, Palo Alto and cyberoam firewalls Install and configure with unified threat management and traffics control for active directory. • A good Knowledge in firewalls products such as F5 and Fortinet. • A good Knowledge in system analysis with Agile and scram methods. • Interact with Programs, Operations and field offices to ensure understanding of business needs and efficient support is delivered. • System administration, supporting multiple platforms and applications. • Manage installation, configuration, maintenance, repair, security and documentation of local area networks, servers, desktop/laptop computers, communication resources and other office equipment. Show less
-
-
-
BROTHER’S PC
-
Sana'a , Yemen
-
IT Assistant
-
Jun 2007 - Feb 2010
• Install and configure new computer hardware for improving and upgrading system performance; support any technology upgrades as required. • Manages IT systems and initiatives to establish, implement and maintain client-focused IT services throughout the Department. • Ensures that the development of all IT projects utilize appropriate, supportable, sustainable platforms and technologies. • Manipulating, cleansing & processing data using Excel, Access, and SQL. • Perform routine PC maintenance and updates for performance efficiency. • Supervise and process help desk support requests. • Assist in maintaining Internet service, firewalls, and telephone systems. • Initiate process improvements to better answer user demands. • Analyzing and managing data by MS Excel with pivot table’s techniques. • Using R language and SPSS for analyzing data. Show less
-
-
Education
-
Southwest Jiaotong University
Doctor of Philosophy - PhD.Candidate, Computer Sciences and Artificial Intelligence -
Cairo University
Master's degree, Computer and Information Systems Security/Information Assurance -
Sana'a University
Bachelor's degree, Information Systems