Personal Information
Entreprise/Lieu de travail
Sydney, Australia Australia
Profession
Senior Cyber Security Consultant at EY
Secteur d’activité
Technology / Software / Internet
Site Web
http://www.RabeiAli.com
À propos
+18 years of extensive experience in various IT fields, especially Information/Cyber Security and Microsoft
Managed end to end implementations for ISMS based on ISO 27001.
Developed information security risk management framework for various entities.
Completed several assessments for government entities and banks.
Program management, project management, executive presentation, and stakeholder management.
Familiarity with infrastructure systems and services, development tools and databases especially Microsoft technologies and products.
Ability to rapidly learn new methodologies, technologies, and processes.
Excellent presentation and communication skill with strong customer facing ...
Mots-clés
rainbow table
decryption
hash
digital signature
algorithm
symmetric
cryptography
public key infrastructure
encryption
asymmetric
pki
Tout plus
Présentations
(1)Personal Information
Entreprise/Lieu de travail
Sydney, Australia Australia
Profession
Senior Cyber Security Consultant at EY
Secteur d’activité
Technology / Software / Internet
Site Web
http://www.RabeiAli.com
À propos
+18 years of extensive experience in various IT fields, especially Information/Cyber Security and Microsoft
Managed end to end implementations for ISMS based on ISO 27001.
Developed information security risk management framework for various entities.
Completed several assessments for government entities and banks.
Program management, project management, executive presentation, and stakeholder management.
Familiarity with infrastructure systems and services, development tools and databases especially Microsoft technologies and products.
Ability to rapidly learn new methodologies, technologies, and processes.
Excellent presentation and communication skill with strong customer facing ...
Mots-clés
rainbow table
decryption
hash
digital signature
algorithm
symmetric
cryptography
public key infrastructure
encryption
asymmetric
pki
Tout plus