SSL Developer Top Expert

Raed Saleh Abu Abdo

 Flag   Jordan   Amman, Amman, Jordan
Freelancer

Services

SSL Developer Top Expert

 Manage information technology and computer systems.
 Plan, organize, control and evaluate IT and electronic data operations.
 Manage IT staff by training and coaching employees, communicating job expectations and appraising their performance.
 As part of the Security group, plan and drive the implementation of the technology and its capabilities. Responsible for the architecture of the technology, eg Firewall, Proxy, IDS…etc
 Act in alignment with user needs and system functionality to contribute to organizational policy.
 Identify problematic areas and implement strategic solutions in time.
 Handle annual budget and ensure cost effectiveness.
 Develop requirements, outlines, budgets, and schedulers for IT projects.
 Oversee all phases of project from conception to completion.
 Follow PMI standards to manage projects through the project lifecycles of initiation, planning, execution, monitoring & controlling and closing.
 Develop security standards, procedures, and guidelines for multiple platforms.
 Meets system security financial objectives by forecasting requirements; preparing an annual budget; scheduling expenditures; analyzing variances; initiating corrective actions.
 Advises senior management by identifying critical security issues; recommending risk- reduction solutions.
 Serves as an internal information security consultant to the organization.
 Implements information security policies and procedures for the organization.
 Reviews all systems-related security plans throughout the organization's network, acting as a liaison to Information Systems.
 Advises the organization with current information about information security technologies and related issues.
 Leads a suitable information security awareness, training and educational activities.
 Monitors the internal control systems to ensure that appropriate access levels are maintained.
 Accomplishes system security and organization mission by completing related results as needed
 Leads an information security risk assessments and controls selection activities.
 Leads an activities relating to contingency planning, business continuity management and IT disaster recovery in conjunction with relevant functions and third parties.
 Undertaking routine preventative measures and implementing, maintaining and monitoring network security, particularly if the network connects to the internet.
 Planning and implementing future IT developments and undertaking project work.
 Monitoring the use of the web by employees.


About

Leverage 17+ years of experience—including 10 years of senior-level leadership—spanning IT infrastructure, communication and network management, project management, information security, system operations, service management, business continuity and disaster recovery.

Education

BSC in Computer Science from the University of Jordan

Work Experience

 Manage information technology and computer systems.
 Plan, organize, control and evaluate IT and electronic data operations.
 Manage IT staff by training and coaching employees, communicating job expectations and appraising their performance.
 As part of the Security group, plan and drive the implementation of the technology and its capabilities. Responsible for the architecture of the technology, eg Firewall, Proxy, IDS…etc
 Act in alignment with user needs and system functionality to contribute to organizational policy.
 Identify problematic areas and implement strategic solutions in time.
 Handle annual budget and ensure cost effectiveness.
 Develop requirements, outlines, budgets, and schedulers for IT projects.
 Oversee all phases of project from conception to completion.
 Follow PMI standards to manage projects through the project lifecycles of initiation, planning, execution, monitoring & controlling and closing.
 Develop security standards, procedures, and guidelines for multiple platforms.
 Meets system security financial objectives by forecasting requirements; preparing an annual budget; scheduling expenditures; analyzing variances; initiating corrective actions.
 Advises senior management by identifying critical security issues; recommending risk- reduction solutions.
 Serves as an internal information security consultant to the organization.
 Implements information security policies and procedures for the organization.
 Reviews all systems-related security plans throughout the organization's network, acting as a liaison to Information Systems.
 Advises the organization with current information about information security technologies and related issues.
 Leads a suitable information security awareness, training and educational activities.
 Monitors the internal control systems to ensure that appropriate access levels are maintained.
 Accomplishes system security and organization mission by completing related results as needed
 Leads an information security risk assessments and controls selection activities.
 Leads an activities relating to contingency planning, business continuity management and IT disaster recovery in conjunction with relevant functions and third parties.
 Undertaking routine preventative measures and implementing, maintaining and monitoring network security, particularly if the network connects to the internet.
 Planning and implementing future IT developments and undertaking project work.
 Monitoring the use of the web by employees.