Leadership & Team
·HUSSAM MOHAMED IS A (network engineer penetration tester & Information Security) Leader with demonstrated success driving proactive security initiatives in a variety of organizations while participating in the development of progressive security architecture and security policy framework solutions in direct support of business objectives.Track record of improving risk resiliency through secure architecture design, information risk management, business requirements development, and security policy lifecycle management. Demonstrated competency in designing and implementing innovative security programs that promote awareness, decrease risk, and enhance the overall business
Outstanding leadership abilities. Demonstrated track record of success coordinating and directing all aspects of project-based security efforts, including initiating and delivering security components and enhancements to meet a wide range of needs
Hands on Experience of vulnerability assessment and penetrating testing using various tools like nikto , Nmap, OWASP zap proxy, Nessus, Kali Linux, and Acunetix.
Hands on experience in backtrack 2, 3, and kali 1, 2 and strong knowledge in Linux OS distribution redhat Ubuntu centos and debian 7 it’s my prefer
Captured and analyzed network packets using Wireshark.
Good Knowledge on network and security technologies such as firewalls TCP/IP, LAN/WAN, IDS/IPS, VPN network, Routing, switching.
Extensive knowledge of TCP/IP networking, Good understanding on OSI model and data travelling procedure between the layers.
Having hand on experience in installing and configuring NETASQ IPSIPS/ FIREWALL as well as managing all application’s function and integrating with active directly throw ALDP protocol.
Established and maintain IPSec-based connectivity with external vendors Supported remote access solutions (Cisco ASA, SSL VPN)
Daily tweaking and maintenance of network systems. Troubleshoot Network anomalies and issues Oversee and Maintain day-to-day network operations.•
Install and configure new and existing network equipment; including Routers, Firewalls, Switches, and Wireless Access Points.
Wire/ wireless LAN/ WAN layout design (Microsoft Visio).
Mange and configure Avaya ipoffice VoIP telephone system
Core competencies lie in Implementing and emerging new technologies, Application administration, System and network upgrading, Multiple operating systems of windows ,User training and support.
Collect and analyze security requirements from internal customers; reconcile and remediate any conflicts with information security policies and standards.
Design and test security solutions utilizing existing products in the security engineering portfolio: firewalls, proxy servers, intrusion detection/prevention, data loss prevention, anti-virus, anti-spam, vulnerability scanning, security information and event management.
Implement security solutions, or work with vendor partners to implement solutions per the organization’s change management process and procedures.
Provide operational oversight of vendor’s performance in managing security solutions. Manage work requests (Service Now) related to security incidents and security engineering services; works with users, IT support staff and vendor partners to troubleshoot and resolve problems associated with security products and related processes.
Develop and maintain documentation of the design, implementation and operation of security products and processes Work with vendor partners to monitor security products for evidence of unauthorized activities or violation of the organization’s security policies, standard , procedures; reports incidents and violations to management.
Develop and collect metrics that measure the volume and trends of work activities and events within the security operations capability; provides regular reports to management Problem identification ,analysis and Network connectivity issues. System integration/ migration.
Utilizes, manages and administers network & security related functions and solutions including, but not limited to, router, switch , firewalls, intrusion detection systems, intrusion prevention systems, incident response systems, threat management systems, two-factor authentication systems, antivirus and malware analysis systems, secure email gateway appliances, web filtering proxy solutions, security information and event management (SIEM) platforms, data loss prevention systems, vulnerability detection and network penetration test , content filtering and identity and access management systems.
Business Description
Its usually begins with a short description of the industry. When describing the industry, discuss the present outlook as well as future possibilities. You should also provide information on all the various markets within the industry, including any new products or developments that will benefit or adversely affect your business.
Now that you understand why you need a business plan and you’ve spent some time doing your homework gathering the information you need to create one, it’s time to roll up your sleeves and get everything down on paper. The following pages will describe in detail the seven essential sections of a business plan: what you should include, what you shouldn’t include, how to work the numbers and additional resources you can turn to for help. With that in mind, jump right in.
Executive Summary
will follow the title page. The summary should tell the reader what you want. This is very important. All too often, what the business owner desires is buried on page eight. Clearly state what you’re asking for in the summary. We won’t to work in airline business and we wont to be the best in the region in the next 10 years. * (best 5 in Africa in )
Business Description
Usually begins with a short description of the industry. When describing the industry, discuss the present outlook as well as future possibilities. You should also provide information on all the various markets within the industry, including any new products or developments that will benefit or adversely affect your business. ?
An airline is a company that provides air transport services for traveling passengers and freight. Airlines utilize aircraft to supply these services and may form partnerships or alliances with other airlines for codeshare agreements. Generally, airline companies are recognized with an air operating certificate or license issued by a governmental aviation body.
Airlines vary in size, from small domestic airlines to full-service international airlines. Airline services can be categorized as being intercontinental, domestic, regional, or international, and may be operated as scheduled services or charters.
Market Strategies
Are the result of a meticulous (exactly sharp) market analysis. A market analysis forces the corporate team to become familiar with all aspects of the market so that the target market can be defined and the company can be positioned in order to garner its share of sales.
· Increase sales *app
· Bring in new customers *sales point
· Get existing customers to buy more *pursuers discounts
· Introduce a new product or service *FSF cargo training ground handling tours
· Increase market share *strategic partners
· Better establish your brand *time factors
· Improve customer loyalty
· Launch an advertising campaign
· Encourage word of mouth *promotion of the employee
· Increase market share
· Retain existing profitable customers *hospitality * foods people from west did not eat rise with check
· Make customers feel more valued
· Offer existing customers exclusive offers
· Ensure business stays fresh and new update * the web site * call center customer service
The risk management
is the identification, evaluation, and prioritization of risks (defined in ISO 31000 as the effect of uncertainty on objectives) followed by coordinated and economical application of resources to minimize, monitor, and control the probability or impact of unfortunate events[1] or to maximize the realization of opportunities. Risk management’s objective is to assure uncertainty does not deflect the endeavor from the business goals.
When we transfer the risk .
1. identify, characterize threats
2. assess the vulnerability of critical assets to specific threats
3. determine the risk (i.e. the expected likelihood and consequences of specific types of attacks on specific assets)
4. identify ways to reduce those risks
5. prioritize risk reduction measures
Competitive Analysis
The purpose of the competitive analysis is to determine the strengths and weaknesses of the competitors within your market, strategies that will provide you with a distinct advantage, the barriers that can be developed in order to prevent competition from entering your market, and any weaknesses that can be exploited within the product development cycle.
Tarco nova Bader ….
Design & Development Plan
The purpose of the design and development plan section is to provide investors with a description of the product’s design, chart its development within the context of production, marketing and the company itself, and create a development budget that will enable the company to reach its goals.
Operations & Management Plan
Its designed to describe just how the business functions on a continuing basis. The operations plan will highlight the logistics of the organization such as the various responsibilities of the management team, the tasks assigned to each division within the company, and capital and expense requirements related to the operations of the business.
Financial Factors
Financial data is always at the back of the business plan, but that doesn’t mean it’s any less important than up-front material such as the business concept and the management team.
www.linkedin.com/in/hussam-mohamed-85a48ba2/