This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
User:Eng.ehabfahmi
❖Info Security Engineer | Info Security Researcher | Info Security Consultant |Software Engineer | Computer Science & Software Engineering Researcher | Malware Analyst | Malware Researcher | Security Analyst | Threat Analyst | Info Technology Consultant | Instructor | Penetration Tester | Info Security & Info Technology Audit❖ Arabic, Egyptian, Muslim, I'm not a Terrorist . http://about.me/eng.ehabfahmi I'm an information security professional with deep and diverse experience in leading organizations. I'm possess a set of multifaceted skills including governance, risk & compliance, technical and instructional skills. I'm also a regular presenter in renowned information security conferences, in my spare time an active blogger in (http://goo.gl/HqzA56). Concerns: - Information Security and IT Audit. - Risk Assessment , GAP Analysis , Security policies. - Firewalls, & Intrusion Prevention. - Data Loss Prevention. - Email Filtering, & Web Filtering. - Advanced Malware Protection (Threat Emulation/APT Prevention). - Forensics Software. - Vulnerability Management/Assessment Software, & Web Application Scanning Software. - Managed Infrastructure Information Security “ISO 27001:2013”. - Maintenance of the equipment and Internet networks to all large, medium and small enterprises. - Search for malicious activity across the enterprise, analyze data from a variety of security tools and sources. - Perform network and application security testing, report results, and provide consultation for mitigation. - Research, develop, update, and document security testing methodologies and procedures. - Conduct security reviews, perform risk analysis and vulnerability assessments. - Participate in security incident response and forensic investigations including analysis of identified malware. - Provide security subject matter expertise on projects. - Research, recommend and deploy security products and tools. - Work off hours to support project schedules or incident response.