Profiles search
Oussama Ridouani
MBA Information Technology at Johnson & Wales University
Boston, MA, United States
Details
Experience:
• Planned and coordinated the testing of recovery support and business resumption procedures while ensuring the recovery and restoration of key IT resources and data and the resumption of critical systems within the desired timeframe.
• Participated at the annual penetration test, and created remediation tickets for concerned teams.
• Created documentation for hardening operating systems.
2018 : Present
Ingenico
Information Security Engineer
•Utilized Security Information and Event Management (SIEM), Intrusion Detection & Prevention (IDS / IPS), Data Leakage Prevention (DLP), forensics, sniffers and malware analysis tools.
•Conducted system security assessments based on NIST 800-53.
•Configured VMware environment. Installed and administered Windows Server 2003, which included installing Active Directory, DNS and DHCP.
•Assembled and produced two running cyber honey pots for data collections and analysis
•Read Symantec logs and make sure CIO is aware of any anomalies and odd behavior on the network.
•Worked with monitoring tools such as Wireshark and McAfee NTR (Network Threat Response).
•Analyzed and determined root cause of security breaches and changed security controls.
•Presented and explained Company’s approach and methodology of security standards assessments and technical assessments to potential customers.
•Developed, improved and helped implement best practices for risk reduction across the company systems, network and interfaces.
2015 : 2016
Up Northern International
Information Security Analyst
•Performed monitoring and investigation of network traffic by using Netwitness.
•Analyzed traffic flow patterns by capturing packets on the network using Wireshark (packet analyzer) to identify rouge protocols and nodes on the network.
•Used NetDetector for network security surveillance, signature-based anomaly detection, analytics and forensics.
•Collaborated in teams of technical and non-technical experts.
•Assisted in the writing and review of departmental security policies.
2014 : 2015
Modis
Junior Information Security Analyst
• Participated at the annual penetration test, and created remediation tickets for concerned teams.
• Created documentation for hardening operating systems.
2018 : Present
Ingenico
Information Security Engineer
•Utilized Security Information and Event Management (SIEM), Intrusion Detection & Prevention (IDS / IPS), Data Leakage Prevention (DLP), forensics, sniffers and malware analysis tools.
•Conducted system security assessments based on NIST 800-53.
•Configured VMware environment. Installed and administered Windows Server 2003, which included installing Active Directory, DNS and DHCP.
•Assembled and produced two running cyber honey pots for data collections and analysis
•Read Symantec logs and make sure CIO is aware of any anomalies and odd behavior on the network.
•Worked with monitoring tools such as Wireshark and McAfee NTR (Network Threat Response).
•Analyzed and determined root cause of security breaches and changed security controls.
•Presented and explained Company’s approach and methodology of security standards assessments and technical assessments to potential customers.
•Developed, improved and helped implement best practices for risk reduction across the company systems, network and interfaces.
2015 : 2016
Up Northern International
Information Security Analyst
•Performed monitoring and investigation of network traffic by using Netwitness.
•Analyzed traffic flow patterns by capturing packets on the network using Wireshark (packet analyzer) to identify rouge protocols and nodes on the network.
•Used NetDetector for network security surveillance, signature-based anomaly detection, analytics and forensics.
•Collaborated in teams of technical and non-technical experts.
•Assisted in the writing and review of departmental security policies.
2014 : 2015
Modis
Junior Information Security Analyst
Company:
Ingenico
About
Talented Information Security Analyst with 3 years of experience in the business world. Implemented security measures and protected valuable data. Self-motivated and goal oriented person with ability to work in team of technical and non-technical experts.