<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=User%3AEng.ehabfahmi</id>
		<title>User:Eng.ehabfahmi - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=User%3AEng.ehabfahmi"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Eng.ehabfahmi&amp;action=history"/>
		<updated>2026-04-24T17:22:40Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Eng.ehabfahmi&amp;diff=204023&amp;oldid=prev</id>
		<title>KateHartmann: Creating user page for new user.</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Eng.ehabfahmi&amp;diff=204023&amp;oldid=prev"/>
				<updated>2015-11-30T13:39:53Z</updated>
		
		<summary type="html">&lt;p&gt;Creating user page for new user.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;❖Info Security Engineer | Info Security Researcher | Info Security Consultant |Software Engineer | Computer Science &amp;amp; Software Engineering Researcher | Malware Analyst | Malware Researcher | Security Analyst | Threat Analyst | Info Technology Consultant | Instructor | Penetration Tester | Info Security &amp;amp; Info Technology Audit❖&lt;br /&gt;
Arabic, Egyptian, Muslim, I'm not a Terrorist .&lt;br /&gt;
http://about.me/eng.ehabfahmi&lt;br /&gt;
I'm an information security professional with deep and diverse experience in leading organizations. I'm possess a set of multifaceted skills including governance, risk &amp;amp; compliance, technical and instructional skills. I'm also a regular presenter in renowned information security conferences, in my spare time an active blogger in (http://goo.gl/HqzA56).&lt;br /&gt;
Concerns:&lt;br /&gt;
- Information Security and IT Audit.&lt;br /&gt;
- Risk Assessment , GAP Analysis , Security policies.&lt;br /&gt;
- Firewalls, &amp;amp; Intrusion Prevention.&lt;br /&gt;
- Data Loss Prevention.&lt;br /&gt;
- Email Filtering, &amp;amp; Web Filtering.&lt;br /&gt;
- Advanced Malware Protection (Threat Emulation/APT Prevention).&lt;br /&gt;
- Forensics Software.&lt;br /&gt;
- Vulnerability Management/Assessment Software, &amp;amp; Web Application Scanning Software.&lt;br /&gt;
- Managed Infrastructure Information Security “ISO 27001:2013”.&lt;br /&gt;
- Maintenance of the equipment and Internet networks to all large, medium and small enterprises.&lt;br /&gt;
- Search for malicious activity across the enterprise, analyze data from a variety of security tools and sources.&lt;br /&gt;
- Perform network and application security testing, report results, and provide consultation for mitigation.&lt;br /&gt;
- Research, develop, update, and document security testing methodologies and procedures.&lt;br /&gt;
- Conduct security reviews, perform risk analysis and vulnerability assessments.&lt;br /&gt;
- Participate in security incident response and forensic investigations including analysis of identified malware.&lt;br /&gt;
- Provide security subject matter expertise on projects.&lt;br /&gt;
- Research, recommend and deploy security products and tools.&lt;br /&gt;
- Work off hours to support project schedules or incident response.&lt;/div&gt;</summary>
		<author><name>KateHartmann</name></author>	</entry>

	</feed>