Basic Info

Ahmed Saleh

8 years

Giza, Egypt

Bachelor's Degree

Experienced

Work Experience

Information Security Team Lead at Ministry of communications & information technology

Experience Details

Information Security Team Lead

IT/Software Development

Experienced (Non-Manager)

• Prepare and implement of necessary information security policies,
standards, procedures and guidelines.
• Ensures and monitors security compliance with government rules and regulations.
• Conducts network monitoring using SIEM solution Qradar and intrusion
detection analysis using Intrusion Detection/Prevention Systems
(IDS/IPS).
• Reviews alerts and data from sensors and documents formal, technical
incident reports.
• Correlates network activity across networks to identify trends of
unauthorized use.
• Researches emerging threats and vulnerabilities to aid in the identification
of network incidents.
• Supports the creation of business continuity/disaster recovery plans.
• Reports security performance against established security metrics and
develop plans for improvement.
• Creates an information security awareness program to ensure staff
members across the organization understand the trade-off between risk
and return.
• Work with application development teams to minimize security threats and
continuously monitor vulnerabilities as part of the SDLC process.


Company Details

Ministry of communications & information technology

Giza, Egypt

More than 1000 employees

Information Technology Services

www.mcit.gov.eg

May 2016 to present (1 year 5 months)
Sr. Network Security Engineer at Ministry of communications & information technology

Experience Details

Sr. Network Security Engineer

IT/Software Development

Experienced (Non-Manager)

• Configuring, Managing and Troubleshooting Web Application Firewalls and Load Balancer F5.
• Implementing IBM QRadar SIEM full installation including connecting and tuning feeds from various platforms (servers, network devices, databases, clients, applications, etc.).
• Configuring, Managing and Troubleshooting firewalls (FortiGate, Juniper, Cisco ASA, Palo Alto).
• Managing SSL VPN using Juniper MAG 4610.
• Configuring, Managing and Troubleshooting Blue Coat as a proxy.



Company Details

Ministry of communications & information technology

Giza, Egypt

More than 1000 employees

Information Technology Services

www.mcit.gov.eg

Apr 2014 to Apr 2016 (2 years)
Information Security Engineer at Ministry of communications & information technology

Experience Details

Information Security Engineer

IT/Software Development

Entry Level

• Perform regular vulnerability assessments, risk analyses and security
assessments using (Acunetix WVS).
• Configure Enterprise McAfee Intrusion Detection and Prevention System
IDS/IPS.
• Implementation and deployment Trendmicro OfficeScan Server and apply
OfficeScan agent .
for around 3500 users .
• Implementation and deployment Trendmicro Vulnerability protection
server.
• Implementation and deployment Trendmicro Deep Security Manager to
protect servers.
• Monitoring and administration Trendmicro Deep Discovery Inspector and
Deep Discovery Analyzer as ATP solution.


Company Details

Ministry of communications & information technology

Giza, Egypt

More than 1000 employees

Information Technology Services

www.mcit.gov.eg

Mar 2012 to Mar 2014 (2 years)
Transmission engineer at HUAWEI Technologies Co., Ltd

Experience Details

Transmission engineer

Engineering - Telecom/Technology

Experienced (Non-Manager)

• Follow up the subcontractor companies.
• Technical support for subcontractor companies.
• Metro swap & NEC swap (Etisalat project).
• Vodafone IP MW swap project.
• Acceptance audit for Vodafone sites.
• Re-Design the MW link by re-routing the path due to LOS problem.
• Re-Design the MW link that is under Problematic MW link.


Company Details

HUAWEI Technologies Co., Ltd (multinational)

Giza, Egypt

More than 1000 employees

Telecommunications

www.huawei.com

Mar 2010 to Feb 2012 (1 year 11 months)
Telecom engineer at CellNet International Co.

Experience Details

Telecom engineer

Engineering - Telecom/Technology

Entry Level

• Installation for new sites.
• Commissioning for new sites.
• Route.
• Expansion for 2G & 3G.
• Make LOS for new links.


Company Details

CellNet International Co. (multinational)

Cairo, Egypt

More than 1000 employees

Telecommunications

www.cellnet-international.com/

Aug 2009 to Feb 2010 (6 months)
Assistant project Leader Operation & Maintenance Dept. at Mobiserve Co.

Experience Details

Assistant project Leader Operation & Maintenance Dept.

Engineering - Telecom/Technology

Entry Level

• Facing and solving communications problems for many sites.
• Direct contact with all employees in relation with the fulfillment of the
objectives.
• Maintenance for Etisalat sites.


Company Details

Mobiserve Co. (multinational)

Giza, Egypt

More than 1000 employees

Telecommunications

www.mobiserveholding.com

Jan 2009 to Jul 2009 (6 months)

Achievements


• I support as Security Consultant for CAPMAS (Central Agency for Public
Mobilization and Statistics) from Feb. to June 2017.
• Evaluate new technologies and processes that enhance security capabilities.
• I had Certificate of Appreciation for Assisting ITU Staff for all IT Security works during
the 16th Global Symposium for Regulators that took place in Sharm El-Sheikh, Egypt
from 11 to 14 May 2016.


• Design Security solutions for government sectors.
• Perform VPN solution between government branches.
• I had Certificate of excellence for outstanding performance and dedication in IT
Security works during participation at Arab League Summit in Sharm El-Sheikh during
March 2015.



• perform vulnerability assessments, risk analyses for government sectors.
• Implement and deploy IDS/IPS for government sectors.


• I achieved around 300 links at Upper Egypt & Sinai ( Vodafone IP MW swap project).
• I achieved around 250 links at Upper Egypt & Sinai for Metro swap & NEC swap
(Etisalat project).


I achieved around 60 new sites (2G & 3G) at Delta Region.


I achieved maintenance and solving communications problem for around 130 sites at Alex Region.


For the university: I was graduated from faculty of engineering with very good (honor grade), I was one of the top ten graduators .

Education

BSc in Electronics & Communications

Education Details

BSc

Electronics & Communications

Faculty of Engineering - Tanta University, Egypt

B / Very Good / 75 - 85%

Networks, Information Technology, Digital Signature Processing, Antennas, Data Structure and Electromagnetic waves.

Graduation Project : Automatic Remote using Networks Project Grade : Excellent

Faculty of Engineering - Tanta University
2003 - 2008
High School - Thanaweya Amma

High School Details

Thanaweya Amma

Sadek El Reafee

Egypt

2002

A / Excellent / 85 -100%

Grade was excellent (96.7 %)

Sadek El Reafee
2002

Certifications

Certificate details

ITIL ® Foundation Certificate in IT Service Management

Sep 2016

27 out of 40

N/A

04046224-01-8KCR

APMG international - AXELOS

ITIL offers a general awareness of key elements, concepts and terminology used in ITIL® service lifecycle, including links between lifecycle stages, processes that contribute to service management.

Certificate details

Trend Micro Certified Professional for Deep Security

Oct 2016

41 out of 45

https://education.trendmicro.com

N/A

Trend Micro

This course provides information about basic architecture, deployment administration options and details
that a network administrator needs for successful implementation and long term
maintenance.

Certificate details

Application Security Analyst Explorer Award

May 2017

48 out of 60

https://www-304.ibm.com

N/A

IBM Africa Skills Academy

IBM AppScan used to scan and test web applications for analysis of vulnerabilities and attacks,understanding OWASP, SQL injection flaws, authentication,cross-site scripting, sensitive data exposure.

Training and Courses

Training/Course Details

IBM Application Security Analyst

May 2017

IBM Africa Skills Academy

IBM AppScan used to scan and test web applications for analysis of vulnerabilities and attacks,understanding OWASP, SQL injection flaws, authentication,cross-site scripting, sensitive data exposure.

Training/Course Details

Application Penetration Testing

May 2017

Secure Misr

Course provides necessary security knowledge to perform penetration tests for web and mobile applications. Also course provides techniques and tools utilized in each step starting from information gathering and ending with exploitation. Defense techniques are elaborated for each attack so that the pen tester could provide proper recommendations to developers and application operators.

Training/Course Details

ITIL

Aug 2016

SECC (Software Engineering Competence Center)

ITIL offers you a general awareness of the key elements, concepts and terminology used in the ITIL® service life cycle, including the links between life cycle stages, the processes used and their contribution to service management practices.

Training/Course Details

Implementing Cisco Edge Network Security Solutions

Mar 2016

Global Knowledge

This course has been designed to provide the knowledge and skills required to implement and manage security on Cisco ASA firewalls, Cisco Routers with the firewall feature set and Cisco Switches. This course gives experience with configuring various perimeter security solutions to mitigate outside threats and secure network zones and reduce the risk to IT infrastructures and applications and provide detailed operations support for Cisco Switches, Cisco ASA, and Router security appliance features.

Training/Course Details

Configuring BIG-IP ASM v11: Application Security Manager

Feb 2016

Arrow - Dubai

The BIG-IP Application Security Manager course gives a functional understanding of how to deploy, tune, and operate BIG-IP Application Security Manager (ASM) to protect web applications from HTTP-based attacks. The course includes discussion about different ASM components for detecting and mitigating threats from multiple attack vectors such web scraping, Layer 7 Denial of Service, brute force, bots, code injection, and zero day exploits.

Training/Course Details

Developing ASP.NET MVC 4 Web Applications

Oct 2015

Secure Misr

This course helps to: 1-Design the architecture and implementation of a web application that will meet a set of functional requirements, user interface requirements, and address business models. 2-Create MVC Models and write code that implements business logic within Model methods, properties, and events. 3-Add Controllers to an MVC Application to manage user interaction, update models, and select and return Views. 4-Create Views in an MVC application that display and edit data and interact with Models and Controllers. 5-Run unit tests and debugging tools against a web application in Visual Studio 2012 and configure an application for troubleshooting. 6-Develop a web application that uses the ASP.NET routing engine to present friendly URLs and a logical navigation hierarchy to users.

Training/Course Details

Cisco Identity Services Engine

Jul 2015

Global Knowledge

Cisco ISE training helps to successfully configure, install and implement this new security product from Cisco. ISE or Identity Services Engine platform for making access control and identity policies that enable companies to maintain infrastructure security, effectively enforce compliance and streamline internal operations. The one-of-a-kind ISE architecture allows businesses to use real-time contextual data from multiple users, networks, and devices. This enables the administrator to use this data for proactive decision making and handling governance issues.

Training/Course Details

Trend Micro Deep Security 9.5

Apr 2015

Trend Micro (Dubai)

This course covers: 1- Installation, deployment and configuration of the different modules: Firewall, Packet Inspection, Web Reputation, Anti-Malware, Integrity Monitoring, and Log Inspection. 2- Administration of the different functions of the product. 3- Threats landscape. 4- Integration with VMware technologies. 5- Agent-based and agent-less scenarios. 6- Performance and sizing of the product. 7- Deployment scenarios: virtualized, cloud and multi-tenancy environments Amazon AWS, VMware vCloud and xSP scenarios.

Training/Course Details

Trend Micro OfficeScan 11.0

May 2015

Trend Micro (Dubai)

This course covers: 1-Design implementation solutions for various network conditions, organizational structures, administrative preferences, and management plans. 2-OfficeScan server and client deployment 3-Communication details 4- Administration of the different functions of the product 5-Threats landscape and protection 6-Client settings and groupings 7-Duplication and updates

Training/Course Details

SQL Server 2012/2014

Apr 2014

New Horizons

This training is divided into sub trainings: • Querying Microsoft SQL Server: This course learns : 1- Describe the basic architecture and concepts of Microsoft SQL Server 2014. 2- Write SELECT queries 3- Query multiple tables 4- Describe the use of data types in SQL Server 5- Use built-in functions 6- Use subqueries,table expressions, set operators 7- Implement pivoting and grouping sets 8- Execute stored procedures 9- Implement error handling 10- Implement transactions • Administering Microsoft® SQL Server This course learns : 1- Install and configure SQL Server 2014. Configure SQL Server databases and storage. 2- Plan and implement a backup strategy. 3- Restore databases from backups. Import and export data. Monitor SQL Server. 4- Trace SQL Server activity. 5- Manage SQL Server security. • Developing Microsoft SQL Server This course learns : 1- Implement PRIMARY KEY, FOREIGN KEY 2- Design and implement tables. 3- Design and implement views 4- Design and implement stored procedures.

Training/Course Details

McAfee Network Security Platform

May 2013

MCS

This course give knowledge for : 1- Installing and configuring the Manager. 2- Managing users and resources. 3- Configuring and managing policies. 4- Analyzing and responding to threats. 5- Tuning your security policies for maximum effectiveness

Training/Course Details

Linux (Fundamental and Administration)

Feb 2013

NTI

Linux course Fundamental & Administration give full knowledge of Linux usage and configuration different types of servers based Linux.

This profile is not updated!
Last update more than 3 months ago.

Jobseeker photo

Profile Skills and Keywords

AcunetixAnalyticalApplication Penetration TestingApplication Security Analyst Explorer AwardArabicAssistant Project Leader Operation & Maintenance Dept.CellNet International Co.Cisco ASACisco Identity Services EngineConfiguring BIG-IP ASM V11: Application Security ManagerDeveloping ASP.NET MVC 4 Web ApplicationsElectronics & CommunicationsEnglishF5FootballFortigateHUAWEI Technologies Co., LtdHard WorkerIBM Application Security AnalystIBM QRadar SIEMIBM Security AppScanITITILITIL Foundation Certificate In IT Service ManagementImplementing Cisco Edge Network Security SolutionsInformation SecurityInformation Security EngineerInformation Security Team LeadInformation Technology ServicesLeaderLinuxLinux (Fundamental And Administration)McAfee Network Security PlatformMobiserve Co.Network SecurityProblem SolverReadingResearchSQL Server 2012/2014Software DevelopmentSr. Network Security EngineerTeam PlayerTelecom EngineerTelecommunicationsTransmission EngineerTravellingTrend MicroTrend Micro Certified Professional For Deep SecurityTrend Micro Deep Security 9.5Trend Micro OfficeScan 11.0

Self-assesed Skills

Languages

Arabic

Arabic

: Fluent

: Fluent

: Fluent

: Fluent

English

English

: Fluent

: Fluent

: Advanced

: Fluent

Tools and Technologies

Acunetix

Acunetix

: Expert

: Extreme - I love it!

:

1-3 years

IBM QRadar SIEM

IBM QRadar SIEM

: Expert

: Extreme - I love it!

:

1-3 years

Cisco ASA

Cisco ASA

: Expert

: Extreme - I love it!

:

1-3 years

F5

F5

: Expert

: Extreme - I love it!

:

1-3 years

Trend Micro

Trend Micro

: Expert

: Extreme - I love it!

:

3-5 years

Fortigate

Fortigate

: Expert

: Extreme - I love it!

:

3-5 years

Linux

Linux

: Advanced

: High

:

1-3 years

IBM Security AppScan

IBM Security AppScan

: Advanced

: High

:

1-3 years

Fields of Expertise

Network Security

Network Security

: Expert

: Extreme - I love it!

:

1-3 years

Information Security

Information Security

: Expert

: Extreme - I love it!

:

3-5 years

Key Skills

Analytical, Leader, Hard worker, Problem Solver, Team Player

Online Presence

https://www.linkedin.com/in/ahmed-saleh-0064b336/

Ahmed is looking for new exciting career opportunities… Please share…

Get Your own Wuzzuf Profile Now !

Employer? If you're representing an organization or an enterprise, Signup here for FREE to see Ahmed's full profile and find more great talent and professionals to join your team.