Rafik SAIDI
Administrateur senior at Societe Anonyme- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
-
French Native or bilingual proficiency
-
English Professional working proficiency
Topline Score
Bio
Credentials
-
Activate
OktaApr, 2023- Oct, 2024 -
Sizing Associate
NutanixJan, 2023- Oct, 2024 -
Brocade SAN Administrator
BrocadeAug, 2021- Oct, 2024 -
ET15 - Sophos Central Endpoint and Server v2.0 - Engineer
SophosMar, 2021- Oct, 2024 -
DELL EMC MidRange Storage Credential 2020
Dell EMCDec, 2020- Oct, 2024 -
DELL EMC Server Credential 2020
Dell EMCDec, 2020- Oct, 2024 -
CSPT01 - XG Firewall - Cloud Security Provider
SophosNov, 2020- Oct, 2024 -
CSPT02 - Server Protection - Cloud Security Provider
SophosNov, 2020- Oct, 2024 -
Ruckus ICX Implementer
Ruckus NetworksOct, 2020- Oct, 2024 -
Sophos XG Certified Architect
SophosSep, 2020- Oct, 2024 -
Sophos XG Certified Engineer
SophosJan, 2020- Oct, 2024 -
CCA (Citrix Certified Administrator XenApp 6.5)
Citrix Systems Japan R&DJan, 2013- Oct, 2024 -
ITIL v3 foundation certification
Pearson VUEAug, 2012- Oct, 2024 -
VTSP (VMware Technical Sales Professional)
VMwareJul, 2012- Oct, 2024 -
VSP (VMware Sales Professional)
VMwareFeb, 2012- Oct, 2024 -
MCSE (Microsoft Certified Systems Engineer) Certification
MicrosoftJul, 2009- Oct, 2024 -
MCSA (Microsoft Certified Systems Administrator) Certification
MicrosoftMar, 2009- Oct, 2024 -
MCP (Microsoft Certified Professional) Certification
MicrosoftJan, 2008- Oct, 2024 -
Nutanix Certified Professional - Multicloud Infrastructure 6
NutanixSep, 2023- Oct, 2024 -
RUCKUS ICX Implementer Accreditation (RICXI)
CommScopeOct, 2020- Oct, 2024
Experience
-
Societe Anonyme
-
Human Resources Services
-
100 - 200 Employee
-
Administrateur senior
-
Aug 2020 - Sep 2023
-
-
-
ADSOFTWARE
-
France
-
Airlines and Aviation
-
1 - 100 Employee
-
Ingénieur systèmes et réseaux
-
May 2018 - Aug 2019
-
-
-
M2i Formation & M2I Formation-diplômante
-
Paris Area, France
-
Training Consultant Cyber Security Expert (VAE Bac+5)
-
Sep 2016 - Jul 2017
Training skills: This training learns to detects security vulnerabilities in information systems. Perform comprehensive audits of networks, servers, workstations or web applications and obtain detailed reports. Identify risks and provide appropriate countermeasures. Training content : PENTESTING • Security of systems and networks. • Security of web applications. • PKI / VPN implementation. • Hacking - implement… Show more Training skills: This training learns to detects security vulnerabilities in information systems. Perform comprehensive audits of networks, servers, workstations or web applications and obtain detailed reports. Identify risks and provide appropriate countermeasures. Training content : PENTESTING • Security of systems and networks. • Security of web applications. • PKI / VPN implementation. • Hacking - implement protection. • Legal risks and responsibilities. • Auditing and pentesting techniques. • Hacking techniques and countermeasure. • Pentesting mobility. FORENSIC • Governance and security strategy. • State of the art of operational security. • Write a PSSI. • Ebios method. • Audit, indicators and control of security. • Security in project mode. • Inforensic Windows analysis. • Linux inforensic analysis. • Inforensic on Android / IOS. Show less Training skills: This training learns to detects security vulnerabilities in information systems. Perform comprehensive audits of networks, servers, workstations or web applications and obtain detailed reports. Identify risks and provide appropriate countermeasures. Training content : PENTESTING • Security of systems and networks. • Security of web applications. • PKI / VPN implementation. • Hacking - implement… Show more Training skills: This training learns to detects security vulnerabilities in information systems. Perform comprehensive audits of networks, servers, workstations or web applications and obtain detailed reports. Identify risks and provide appropriate countermeasures. Training content : PENTESTING • Security of systems and networks. • Security of web applications. • PKI / VPN implementation. • Hacking - implement protection. • Legal risks and responsibilities. • Auditing and pentesting techniques. • Hacking techniques and countermeasure. • Pentesting mobility. FORENSIC • Governance and security strategy. • State of the art of operational security. • Write a PSSI. • Ebios method. • Audit, indicators and control of security. • Security in project mode. • Inforensic Windows analysis. • Linux inforensic analysis. • Inforensic on Android / IOS. Show less
-
-
-
Personnal
-
Tunisia
-
Building Project
-
Jan 2016 - Jul 2016
Originally from a seaside town in northwestern Tunisia with high potential I decided to build a building consisting of several apartments for rental. So to join the various stakeholders in the construction but also oversee the structural work I decided to settle on the spot for 7 months. Originally from a seaside town in northwestern Tunisia with high potential I decided to build a building consisting of several apartments for rental. So to join the various stakeholders in the construction but also oversee the structural work I decided to settle on the spot for 7 months.
-
-
-
alltitude SA
-
Switzerland
-
Information Technology & Services
-
1 - 100 Employee
-
System and Security Engineer
-
Nov 2011 - Oct 2015
Project manager and system administrator My main job is to maintain and improve the Alltitude infrastructure and also Alltitude’s clients. Tasks realized on the Alltitude infrastructure. • Study of resources used by the current virtual Infrastrucutre. • Recommendation for new ESX. • Installation of hardware and software with VMware vSphere ESX 4.1. • SAN configuration with the addition of SAS controllers and adding the new ESX in the SAN hosts. • Displacement of some VM… Show more Project manager and system administrator My main job is to maintain and improve the Alltitude infrastructure and also Alltitude’s clients. Tasks realized on the Alltitude infrastructure. • Study of resources used by the current virtual Infrastrucutre. • Recommendation for new ESX. • Installation of hardware and software with VMware vSphere ESX 4.1. • SAN configuration with the addition of SAS controllers and adding the new ESX in the SAN hosts. • Displacement of some VM on new ESX server. • Migrating from Exchange 2003 to Exchange 2010 in a virtual machine on Windows 2008 R2 64bit. • Replacement of routers (VDSL to FTTH). • Updating of Trend Micro Antivirus. • Cleaning of DNS and Active directory servers. • Renewed and deployed the SSL certificate on Web servers. • Installation of Lync 2010. • Installation of Spiceworks ticketing software. • Installation of PRTG monitoring software. Tasks realized for Solvalor Company: • Audit • Installation of new ESX server and converting of Windows 2008 physical servers to virtual machines. • Installation and configuration of Backup Exec 2012. • Installation and configuration of Quantum VM Pro. • Configuration of NAS to create LUNs. • Installation of Sonicwall Firewall. Tasks realized on the Louis Dreyfus Company: • Installation of workstations for new users. • Helpdesk (Networking, MS Office, Lotus Notes, Printer…). Show less Project manager and system administrator My main job is to maintain and improve the Alltitude infrastructure and also Alltitude’s clients. Tasks realized on the Alltitude infrastructure. • Study of resources used by the current virtual Infrastrucutre. • Recommendation for new ESX. • Installation of hardware and software with VMware vSphere ESX 4.1. • SAN configuration with the addition of SAS controllers and adding the new ESX in the SAN hosts. • Displacement of some VM… Show more Project manager and system administrator My main job is to maintain and improve the Alltitude infrastructure and also Alltitude’s clients. Tasks realized on the Alltitude infrastructure. • Study of resources used by the current virtual Infrastrucutre. • Recommendation for new ESX. • Installation of hardware and software with VMware vSphere ESX 4.1. • SAN configuration with the addition of SAS controllers and adding the new ESX in the SAN hosts. • Displacement of some VM on new ESX server. • Migrating from Exchange 2003 to Exchange 2010 in a virtual machine on Windows 2008 R2 64bit. • Replacement of routers (VDSL to FTTH). • Updating of Trend Micro Antivirus. • Cleaning of DNS and Active directory servers. • Renewed and deployed the SSL certificate on Web servers. • Installation of Lync 2010. • Installation of Spiceworks ticketing software. • Installation of PRTG monitoring software. Tasks realized for Solvalor Company: • Audit • Installation of new ESX server and converting of Windows 2008 physical servers to virtual machines. • Installation and configuration of Backup Exec 2012. • Installation and configuration of Quantum VM Pro. • Configuration of NAS to create LUNs. • Installation of Sonicwall Firewall. Tasks realized on the Louis Dreyfus Company: • Installation of workstations for new users. • Helpdesk (Networking, MS Office, Lotus Notes, Printer…). Show less
-
-
-
International Committee of the Red Cross - ICRC
-
Switzerland
-
Non-profit Organizations
-
700 & Above Employee
-
Security Engineer
-
Nov 2011 - Nov 2012
• I have been part of the implementation of 4 new Juniper firewalls that will replace 2 old Checkpoint to secure the information system against malicious acts in internal and external attacks. o A cluster of two firewalls is intended to set up External DMZs especially those with the Proxy and Reverse Proxy and all servers directly accessible via the Web. o 2 other firewalls are intended for implementation of internal DMZs used to limit the communications between servers to only the ports… Show more • I have been part of the implementation of 4 new Juniper firewalls that will replace 2 old Checkpoint to secure the information system against malicious acts in internal and external attacks. o A cluster of two firewalls is intended to set up External DMZs especially those with the Proxy and Reverse Proxy and all servers directly accessible via the Web. o 2 other firewalls are intended for implementation of internal DMZs used to limit the communications between servers to only the ports useful and to limit the communications from development servers usually accessed by external providers to the Production servers. • Involving the implementation of Firewall rules, the migration of virtual machines in the right DMZ, and the modification of the CISCO routing, and SVI in the various active elements of the network. o The structure consists of 20 ESXi (Vsphere 5) with about 500 virtual machines on Windows 2003 and 2008 that have all been migrated. • This project impacted in a lot of setting like: Public DNS, Reverse proxy, NTDS servers, Active directory Sites and services, FQDN, Windows DNS server, Microsoft Remote application that I had to reconfigure. Before the migration I listed all servers and order them by applications and completed the map of each application and network infrastructure. Then the most important step was to organize the change with the different services to limit the impact of change on the end users. After the changes I documented the changes made and update the application maps. The second contract consisted in informing the IT services about the changes and to organize the changes with them to limit the impact of my project on theirs for example during the implementation of the Cisco Nexus 1000V. My other assignment was to assist the application project managers to implement new software, for example during the upgrading of CMS Publishing software by providing new servers VM and overseeing installations. Show less • I have been part of the implementation of 4 new Juniper firewalls that will replace 2 old Checkpoint to secure the information system against malicious acts in internal and external attacks. o A cluster of two firewalls is intended to set up External DMZs especially those with the Proxy and Reverse Proxy and all servers directly accessible via the Web. o 2 other firewalls are intended for implementation of internal DMZs used to limit the communications between servers to only the ports… Show more • I have been part of the implementation of 4 new Juniper firewalls that will replace 2 old Checkpoint to secure the information system against malicious acts in internal and external attacks. o A cluster of two firewalls is intended to set up External DMZs especially those with the Proxy and Reverse Proxy and all servers directly accessible via the Web. o 2 other firewalls are intended for implementation of internal DMZs used to limit the communications between servers to only the ports useful and to limit the communications from development servers usually accessed by external providers to the Production servers. • Involving the implementation of Firewall rules, the migration of virtual machines in the right DMZ, and the modification of the CISCO routing, and SVI in the various active elements of the network. o The structure consists of 20 ESXi (Vsphere 5) with about 500 virtual machines on Windows 2003 and 2008 that have all been migrated. • This project impacted in a lot of setting like: Public DNS, Reverse proxy, NTDS servers, Active directory Sites and services, FQDN, Windows DNS server, Microsoft Remote application that I had to reconfigure. Before the migration I listed all servers and order them by applications and completed the map of each application and network infrastructure. Then the most important step was to organize the change with the different services to limit the impact of change on the end users. After the changes I documented the changes made and update the application maps. The second contract consisted in informing the IT services about the changes and to organize the changes with them to limit the impact of my project on theirs for example during the implementation of the Cisco Nexus 1000V. My other assignment was to assist the application project managers to implement new software, for example during the upgrading of CMS Publishing software by providing new servers VM and overseeing installations. Show less
-
-
-
Pro-Data LGI S.A.
-
Switzerland
-
IT Services and IT Consulting
-
1 - 100 Employee
-
Network & Systems Engineer & Project Manager
-
Jul 2007 - Jul 2010
Team Leader: • Management of a team composed by 10 people including engineers and technicians. • Implementation of quality control. • Organization of regular coaching meetings for technicians. • Training new employees. • Technical assistance to technicians. • Organization of technical service workstations. Complete installation of WAN / LAN: Installation, management & maintenance of WAN / LAN infrastructures for different clients: Colgate Palmolive… Show more Team Leader: • Management of a team composed by 10 people including engineers and technicians. • Implementation of quality control. • Organization of regular coaching meetings for technicians. • Training new employees. • Technical assistance to technicians. • Organization of technical service workstations. Complete installation of WAN / LAN: Installation, management & maintenance of WAN / LAN infrastructures for different clients: Colgate Palmolive, Iomega, LVMH group Moet Hennessy, Banque Bauer, Yves St Laurent, Frederic Constant… SERVERS: • Installation, migration, maintenance and troubleshooting of Windows server 2000, 2003 and 2008 (Active directory, DNS, DHCP, WINS, GPO, Advanced scripting, RAID Technology, Monitor system logs and activity, file shares and NTFS security, DFRS, Shadow Copy). • Setting up FTP servers, print servers, Terminal server and NAS. • Installation of application server with Citrix Presentation Server 3.5. MESSAGING: • Installation, migration, and troubleshooting of Exchange 2003, 2007 and 2010 with the implementation of OWA, outlook Anywhere, Autodiscover, RPC over HTTP and push mail (HTC, iPhone, Nokia ...). VIRTUALISATION: • Installation and administration of Vmware ESX • Installation of iSCSI SANs and FC SANs. SECURITY: • Firewalls installation. • Antivirus servers . • Backup solutions. • Monitoring (Nagios) LAN/WAN: • Network infrastructure design and management. • Installation of telecommunication systems and supervision of the implementation of Internet access, installation of routers and modems (Zyxel, 3Com, DLink), installation and maintenance of Windows routing services and Windows Remote Access, interconnection of remote sites (VPN tunnel). • Installation of Fiber Channel Switchs and Ethernet Switchs (CISCO, HP). • Installation, migration and support on the PC Windows, MAC (OSX) and devices (fax, printer, scanner, copier ...). • Reservation of domain names, order of static IP, web hosting and redirection of MX record. Show less Team Leader: • Management of a team composed by 10 people including engineers and technicians. • Implementation of quality control. • Organization of regular coaching meetings for technicians. • Training new employees. • Technical assistance to technicians. • Organization of technical service workstations. Complete installation of WAN / LAN: Installation, management & maintenance of WAN / LAN infrastructures for different clients: Colgate Palmolive… Show more Team Leader: • Management of a team composed by 10 people including engineers and technicians. • Implementation of quality control. • Organization of regular coaching meetings for technicians. • Training new employees. • Technical assistance to technicians. • Organization of technical service workstations. Complete installation of WAN / LAN: Installation, management & maintenance of WAN / LAN infrastructures for different clients: Colgate Palmolive, Iomega, LVMH group Moet Hennessy, Banque Bauer, Yves St Laurent, Frederic Constant… SERVERS: • Installation, migration, maintenance and troubleshooting of Windows server 2000, 2003 and 2008 (Active directory, DNS, DHCP, WINS, GPO, Advanced scripting, RAID Technology, Monitor system logs and activity, file shares and NTFS security, DFRS, Shadow Copy). • Setting up FTP servers, print servers, Terminal server and NAS. • Installation of application server with Citrix Presentation Server 3.5. MESSAGING: • Installation, migration, and troubleshooting of Exchange 2003, 2007 and 2010 with the implementation of OWA, outlook Anywhere, Autodiscover, RPC over HTTP and push mail (HTC, iPhone, Nokia ...). VIRTUALISATION: • Installation and administration of Vmware ESX • Installation of iSCSI SANs and FC SANs. SECURITY: • Firewalls installation. • Antivirus servers . • Backup solutions. • Monitoring (Nagios) LAN/WAN: • Network infrastructure design and management. • Installation of telecommunication systems and supervision of the implementation of Internet access, installation of routers and modems (Zyxel, 3Com, DLink), installation and maintenance of Windows routing services and Windows Remote Access, interconnection of remote sites (VPN tunnel). • Installation of Fiber Channel Switchs and Ethernet Switchs (CISCO, HP). • Installation, migration and support on the PC Windows, MAC (OSX) and devices (fax, printer, scanner, copier ...). • Reservation of domain names, order of static IP, web hosting and redirection of MX record. Show less
-
-
-
G. Cartier Technologies
-
France
-
Motor Vehicle Manufacturing
-
1 - 100 Employee
-
System Administrator
-
Feb 2006 - Jun 2007
• Participate in the development strategy of micro computers and networks. • Ensure compliance with the security of information systems. • Management of Licenses. • Updated antivirus and operating systems. • Operate general network on 3 sites. • Guaranteed availability of PCs in providing support for intervention, maintenance and backups... • Train and assist users to improve efficiency. • Write PC procedures and keeps them updated. • Established and optimizes the micro… Show more • Participate in the development strategy of micro computers and networks. • Ensure compliance with the security of information systems. • Management of Licenses. • Updated antivirus and operating systems. • Operate general network on 3 sites. • Guaranteed availability of PCs in providing support for intervention, maintenance and backups... • Train and assist users to improve efficiency. • Write PC procedures and keeps them updated. • Established and optimizes the micro computer budgets. • Windows 2000, 2003, Lotus Domino 6 server administration and maintenance. • Managing Security with Arkoon Firewall interconnected on three sites, Arcserve and Backup Exec back-up and eTrust antivirus. • AS400 Client Access installation (Brain). Show less • Participate in the development strategy of micro computers and networks. • Ensure compliance with the security of information systems. • Management of Licenses. • Updated antivirus and operating systems. • Operate general network on 3 sites. • Guaranteed availability of PCs in providing support for intervention, maintenance and backups... • Train and assist users to improve efficiency. • Write PC procedures and keeps them updated. • Established and optimizes the micro… Show more • Participate in the development strategy of micro computers and networks. • Ensure compliance with the security of information systems. • Management of Licenses. • Updated antivirus and operating systems. • Operate general network on 3 sites. • Guaranteed availability of PCs in providing support for intervention, maintenance and backups... • Train and assist users to improve efficiency. • Write PC procedures and keeps them updated. • Established and optimizes the micro computer budgets. • Windows 2000, 2003, Lotus Domino 6 server administration and maintenance. • Managing Security with Arkoon Firewall interconnected on three sites, Arcserve and Backup Exec back-up and eTrust antivirus. • AS400 Client Access installation (Brain). Show less
-
-
Education
-
M2I Paris
Master's degree, cyber security consultant expert -
Brasshouse Training Center
English courses -
Mediaroanne
Equivalent Master's degree, Multimedia and Networking -
Lycée Gabriel Fauré
BTS option analyst programmer, Computing -
Lycée Guillaume Fichet
Baccalaureate, Science and technology (STT)