Photo

Ahmed Bilal Assistant Vice President Information Security

Islamabad
• Infrastructure and Application security reviews. • Information Security Governance & Compliance. • IT DR/BCP plan2002200320082008 with Enterprise AD o Juniper Firewall SSG 5202012 o Microsoft Exchange 2000535E78 and 10. Cisco Firewall 515Eaccess over sensitive dataand audit results to key stakeholders. • Engageand Fortigate 1000Cand IT Service Continuity Management • Business Based Macro Level Capacity Planning The above services included the business strategies and deployment plansand training where needed. Technical Skill o Excellent verbal and written communication skill. o Red Hat Enterprise LinuxApacheApplication Design Reviewsas well asASA-5400AvailabilityBCPCapacityCBASChangechanges in user access rightsCollateralConfiguration Management and Service Desk • ITIL Service Delivery areas of Service LevelconfiguredcontactorsCorporate BackupsCross cables UTP (Cat 5E & 6) • ConfiguredData Center Consolidationdelivery and developing the appropriate delivery guidesdevelopDigital signatures/ certificatesDOS AttacksDRPeither directly or via Change Managementenhanced and existing information systems. • Ensure compliance to Information Security policiesERPetc. • Review logs of systems audit trail. • Preparation and Implementation Bring Your Own Device(BYOD) • Preparation and Implementation of Virus protection Policy. • ReviewFedoraFinancialFortigate 1000Free BSDfrequent access over customer informationguidelines and standards with respect to application systems. • Security risk management of newhigh-end serverIISIMAP4Implementation and Review. Responsibilities • Maintain bank wide information security triad; Availabilityincluding Security appliancesIT and Non IT infrastructuremarketingMonitoring and Incident Management. • Implementation of Secure Network InfrastructureMS Outlook CASE Tools: MS VisioMs ProjectNetwork and System Administration with hands-on on the latest Enterprise Level Technologies. Expertise in Information Security Policies implementationNetwork Optimizationnetworks and backup systems and strengthened Information security. My personal interest is in Information Securityo Intrusion Detection System (e.g. SNORT) o Firewalls (IP Tableso Juniper Firewall SSG 520. o Multimedia Panasonic o APC 16KVA UPS Symmitra LX Application/Web Servers: WebLogic ServerOperations Review and Managed Care Services • IT Service Management (ITSM) based on ITIL best practices • ITIL Service Support areas of IncidentPOP3potential risksprioritization and remedial. • Prepare and Implement Information security awareness and training program all employeesProblemproceduresProcessesproducts and control techniques. • Preparation and Implementation of Disaster recovery and business continuity planning. • Communicate and provide expert advice on emerging issuesPublic / Private keys) o Squid Proxy 2.1 o DB2 Databases o Domino Lotus 6.5 mailing system o Windows Server 2000ReleaseRISK ManagementSalesSSLStorageStorage and Data Modeling and MigrationSUMMARY: 15 years visionary and goal-oriented experience in Information SecuritySymantec Enterprise Endpoint Soltuion o Tivoli Storage and backup syste. o Windows XP Professional ClientsSystem and Network Security AuditsSystem Hardeningtest and implement security plansto review and authorize change control requests; all new deployments and configuration changes within information systems and business applications. • Ensure vulnerabilities identificationTomcattransactions trend varianceTroubleshoot and maintenance of Local Area Network • Configured and managed layer 2 and layer 3 network devices. • Maintenance of VLANS (3Com Switch). • SetupUbnutovendors and third. PROFESSIONAL EXPERIENCE: Dec 2007-to JulyVirtual Environment and Storage. In my career I have worked with latest technologies in MISVistawww.uaar.edu.pk. Pakistan. BIOGRAPHIC DETAILS:

15 years visionary and goal-oriented experience in Information Security, Network and System Administration with hands-on on the latest Enterprise Level Technologies. Expertise in Information Security Policies implementation, Risk management, System Hardening, System and Network Security  Audits, BCP , DRP, Corporate Backups, Network Optimization, Virtual Environment and Storage. In my career I have worked with latest technologies in MIS, ERP, CBAS, high-end server, storage, networks and backup systems and strengthened Information security. My personal interest is in Information Security, Disaster Recovery and Governance Risk and Compliance. We follow industry best practices and latest technology gives me cutting edge advantages in efficiently handling large Scale enterprise setup.