Download PDF


Looking forward to a challenging job to utilize my technical and management skills for the growth of organization.

Work experience

Nov 2019

IT security technical lead

National Cybersecurity Authority
  • Build and maintain enterprise security strategy and road-map that will support security requirements, business objectives, and overall strategy.
  • leading of Security Architecture on projects as well as ensuring the successful on-time, on-scope, and on-budget deliveries of those projects.
  •  Ensure information security risks are identified and monitored.
  • Lead the operationalization of security compliance programs to support compliance regulations and ensuring IT activities, processes, and procedures meet defined requirements and policies.
  • Manage and operate security processes such as vulnerability management and incident response.
  • Monitoring & managing security systems such as(IDS, Firewalls, SIEM, EDR).
  • Effectively lead and manage a team with responsibility for the day to day activities.
Dec 2015Nov 2019

Cyber Security Engineer

National Cybersecurity Authority
  • Review and approve the installation of firewall, IDS scanning technologies and other security devices 
  • Test final security structures to ensure they behave as expected
  • Write comprehensive reports including assessment-based findings, outcomes, and propositions for further system security enhancement
  • Involved in the provisioning, deployment, configuration, and administration of many Different pieces of network and security-related hardware and software. These include Firewalls, IPS/IDS, Web proxy, AV, routers, switches, various network monitoring tools.
  • Plan, research and design security architectures for any IT project

Oct 2011Dec 2015

IT Infrastructure Specialist

Saudi Industrial Development Fund
  • Network and systems administration with building, improving, supporting, and architect infrastructures.
  • Developing and implementing a comprehensive plan to secure our computing network.
  • Monitor network performance and review security logs and violation reports for root cause analysis.
  • Handle, manage, and provide technical solutions for events such as incidents, mitigation enhancement, and reporting. 
  • Maintain communication with project stakeholders and manage expectations.


Sep 2008Jul 2011

Information Technology - Information Systrem

King Saud Unversity
  • Design, implement, and evaluate a computer-based system, process, component, or program to meet desired needs.
  • Demonstrate an understanding of professional, ethical, legal, security and social issues and responsibilities.
  • An ability to communicate effectively with a range of audiences.
  • Analyze the local and global impact of computing on individuals, organizations, and society.
Jul 2008

High School Certificate

Al-faisaliah High School

High School Certificate on field of “Science”, With percentage 98%.


  • Implementing different Security controls such as (Firewall, IDS,EDR,Webgatway,AV,SIEM ,PAM,Email gateway)
  • Lead and apply NCA ECC requirements in different environments
  • Lead and apply  ISO 27001
  • Participate in  implementing and operating National cyber security platform
  • Lead and participate Vulnerability management program
  • Participate in creating and implementing Incident response process
  • Lead and mange Cyber security management system
  • Participate in building disaster recover site.


  • PMP
  • Cissp
  • ISO27001:2013LI
  • SSCP
  • CCNP Secuirty
  • CCNA Datacenter
  • ITIL Foundation