How can businesses make the smartest telecom and network choices—choices that are guided as much by the organization’s needs and demands as by cost considerations? Increasingly, companies are opting to partner with managed service providers to harness as many benefits as possible from their telecom and network services. Are they realizing these benefits? View the SlideShare to find out.
Computer security audit is a manual or systematic measurable technical of a system or application. System can include personal computers, servers, mainframes, network routers ,switches. Application can include web server, oracle database or an ERP system employed.
Aaditya Technologies provides a variety of general and specialized IT auditing assistance. Our technology professionals, in locations throughout the world, understand the benefits and risks of information technology. They work with a variety of industries, system platforms and business applications. Whether for specific projects or under a more comprehensive arrangement, Control Solutions can support your internal audit function so that your staff – and your organization’s information systems – are working to their full potential.
Ease out the GDPR adoption with ManageEngineManageEngine
Is your enterprise located in the EU or does it collect and process personal data of the EU citizens? Then it's high time for you to adopt the new GDPR regulation before 25 May, 2018. Check out what's GDPR and how ManageEngine can help you comply with this new mandate.
SanerNow Endpoint Management (EM) is a cloud-delivered
service that allows complete control over all your endpoint
systems. It provides visibility into the status of endpoints and
equips you with hundreds of built-in checks. SanerNow
Endpoint Management provides necessary features for
managing endpoints.
How can businesses make the smartest telecom and network choices—choices that are guided as much by the organization’s needs and demands as by cost considerations? Increasingly, companies are opting to partner with managed service providers to harness as many benefits as possible from their telecom and network services. Are they realizing these benefits? View the SlideShare to find out.
Computer security audit is a manual or systematic measurable technical of a system or application. System can include personal computers, servers, mainframes, network routers ,switches. Application can include web server, oracle database or an ERP system employed.
Aaditya Technologies provides a variety of general and specialized IT auditing assistance. Our technology professionals, in locations throughout the world, understand the benefits and risks of information technology. They work with a variety of industries, system platforms and business applications. Whether for specific projects or under a more comprehensive arrangement, Control Solutions can support your internal audit function so that your staff – and your organization’s information systems – are working to their full potential.
Ease out the GDPR adoption with ManageEngineManageEngine
Is your enterprise located in the EU or does it collect and process personal data of the EU citizens? Then it's high time for you to adopt the new GDPR regulation before 25 May, 2018. Check out what's GDPR and how ManageEngine can help you comply with this new mandate.
SanerNow Endpoint Management (EM) is a cloud-delivered
service that allows complete control over all your endpoint
systems. It provides visibility into the status of endpoints and
equips you with hundreds of built-in checks. SanerNow
Endpoint Management provides necessary features for
managing endpoints.
The Compliancy Group : The Guard, a HIPAA Compliance SolutionCompliancy Group
The Compliancy Group presents, The Guard: A complete HIPAA compliance solution to help you and your organization achieve, illustrate and maintain HIPAA compliance.
Systems, Applications, Products in data processing or SAP was originally introduced in the 1980s as SAP R/2, which was a system that provided users with a soft-real-time business application that could be used with multiple currencies and languages. As Client-servers began to be introduced SAP brought out a server based version of their software called SAP R/3, henceforth referred to as SAP, which was launched in 1992. SAP also developed a graphical user interface, or GUI, to make the system more user friendly and to move away from the mainframe style user interface.
Plus Technologies' cloud printing solution is perfect for organizations with distributed locations such as satellite offices, retail outlets, labs, or health care clinics.
How to Achieve PCI Compliance with an Enterprise Job Scheduler HelpSystems
Credit card processing requires a lot of repeatable tasks that run on strict deadlines, like file transfers and payment reports. But making sure you meet your deadlines and correctly process your transactions while staying PCI compliant is a lot of work. How will you manage?
In this presentation, we discuss:
• How an enterprise scheduler supports audit and compliance regulations
• The value of automatic process documentation for all workflows
• The significance of exception reporting to ensure that jobs occur on time and without error
Vulnerability Scans & Penetration Test Comparison ChartI.S. Partners, LLC
Are you 100 percent sure you understand the difference between vulnerability scans and penetration tests? Learn the specific variations here from I.S. Partners, LLC!
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...EnergySec
After a brief introduction by Mr. Humphreys, Henry Bailey will talk a few minutes about SAP’s roadmap for utilities. This will be followed by a discussion led by Chris Humphreys about the evolutionary transition from disparate point solutions to enterprise-wide, end-to-end, Regulation Management where controls are consolidated and leveraged such that compliance is a byproduct of industry best practices. Finally, Mr. Rice and Chris Humphreys will end the hour with a presentation expanding on the concept of controls consolidation and compliance as a byproduct focused on NERC CIP Ver 3-5 and NIST transitional capabilities of Regulation Management.
Mobile audits makes it easy for different organizations to assess their compliance status against internal policies and regulations. They always contribute to operational excellence by the identification of operational risks that can lead to process inefficiencies and non-compliance.
NOC services offer controls and monitors networks. These are consulted since they are reliable and have the best technology with latest tools. These services have high level of expertise and understanding of various technology platforms. We provide you outsourced noc and help desk services.
I have been working in the area of information technology for more than 17 years with Elgouna School . I have experienced in IT and computer systems with ElGouna Resort Real estate and construction company. I performed and directed a various activities related to IT. I managed tasks of more than (6) IT staffs. I conducted research to build innovative information technology system that is more effective than the past.
I have good leadership skills that make me capable for leading other staffs. I am effective organizer and planner. I have innovative idea for IT problems. I am able to work under pressure. My self-discipline will give benefits for your company.
I attached my resume a long this letter. I hope my resume can explain my experience and expertise’s clearly. I wish to join your company and It will be my new challenge.
The Compliancy Group : The Guard, a HIPAA Compliance SolutionCompliancy Group
The Compliancy Group presents, The Guard: A complete HIPAA compliance solution to help you and your organization achieve, illustrate and maintain HIPAA compliance.
Systems, Applications, Products in data processing or SAP was originally introduced in the 1980s as SAP R/2, which was a system that provided users with a soft-real-time business application that could be used with multiple currencies and languages. As Client-servers began to be introduced SAP brought out a server based version of their software called SAP R/3, henceforth referred to as SAP, which was launched in 1992. SAP also developed a graphical user interface, or GUI, to make the system more user friendly and to move away from the mainframe style user interface.
Plus Technologies' cloud printing solution is perfect for organizations with distributed locations such as satellite offices, retail outlets, labs, or health care clinics.
How to Achieve PCI Compliance with an Enterprise Job Scheduler HelpSystems
Credit card processing requires a lot of repeatable tasks that run on strict deadlines, like file transfers and payment reports. But making sure you meet your deadlines and correctly process your transactions while staying PCI compliant is a lot of work. How will you manage?
In this presentation, we discuss:
• How an enterprise scheduler supports audit and compliance regulations
• The value of automatic process documentation for all workflows
• The significance of exception reporting to ensure that jobs occur on time and without error
Vulnerability Scans & Penetration Test Comparison ChartI.S. Partners, LLC
Are you 100 percent sure you understand the difference between vulnerability scans and penetration tests? Learn the specific variations here from I.S. Partners, LLC!
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...EnergySec
After a brief introduction by Mr. Humphreys, Henry Bailey will talk a few minutes about SAP’s roadmap for utilities. This will be followed by a discussion led by Chris Humphreys about the evolutionary transition from disparate point solutions to enterprise-wide, end-to-end, Regulation Management where controls are consolidated and leveraged such that compliance is a byproduct of industry best practices. Finally, Mr. Rice and Chris Humphreys will end the hour with a presentation expanding on the concept of controls consolidation and compliance as a byproduct focused on NERC CIP Ver 3-5 and NIST transitional capabilities of Regulation Management.
Mobile audits makes it easy for different organizations to assess their compliance status against internal policies and regulations. They always contribute to operational excellence by the identification of operational risks that can lead to process inefficiencies and non-compliance.
NOC services offer controls and monitors networks. These are consulted since they are reliable and have the best technology with latest tools. These services have high level of expertise and understanding of various technology platforms. We provide you outsourced noc and help desk services.
I have been working in the area of information technology for more than 17 years with Elgouna School . I have experienced in IT and computer systems with ElGouna Resort Real estate and construction company. I performed and directed a various activities related to IT. I managed tasks of more than (6) IT staffs. I conducted research to build innovative information technology system that is more effective than the past.
I have good leadership skills that make me capable for leading other staffs. I am effective organizer and planner. I have innovative idea for IT problems. I am able to work under pressure. My self-discipline will give benefits for your company.
I attached my resume a long this letter. I hope my resume can explain my experience and expertise’s clearly. I wish to join your company and It will be my new challenge.
A technocrat with a proven track record of 25+ years of experience with documented success of consistent achievement in a senior management capacity primarily accountable for complete IT operations. Adept in managing business operations with focus on top & bottom-line performance and expertise in determining company mission and strategic direction. Ability to formulate and implement tactical initiatives to achieve corporate strategic goals. Proven ability in improving operations, enhancing business growth by setting up infrastructures, project management and service delivery. Possess credibility & personal integrity that leaves lasting impression with corporate decision makers, motivates employees and generates loyalty
1. ORGANIZATIONAL EXPERIENCE
Since Mar’14: Al Sulaiteen Group of Companies, Qatar as Group IT Manager
Summary
Responsible for the technical design, planning, implementation, and the highest level
of performance tuning and recovery procedures for mission critical enterprise systems.
Serves as a technical expert in the area of system administration for complex
operating systems.
Recommends the redesign and configuration of operating systems and system
applications. Investigates and analyzes feasibility of system requirements and develops
system specifications. Identifies methods, solutions, and provides project leadership
and management in order to provide a high level of service to the customers of the
department. Performs full supervision of Operations staff.
PRIMARY RESPONSIBILITIES
Managing Existing ERP suite and in Process to implement market leader ERP
Designing new Data Center with 8 physical servers and 4 Virtual Server
MS Exchange Centralization,
Cloud Services with windows azure
CCTV & Security Systems
IP Phones & ATA
Develop requirements, outlines, budgets, and schedulers for information technology projects.
Oversee all phases of project from conception to completion.
Assist with upgrading information security.
Manage team of consultants, programmers, developers, and analysts.
Ensure project is completed within budget and on time.
Develop project tracking and variance reports.
Assemble risk management plans and work effort documents.
Create project documentation.
Provide risk assessment.
Review estimates.
Assess new opportunities.
Prepare proposals.
Flag potential issues.
Manage multiple vendors.
Utilize in‐depth technical knowledge and business requirements to design and implement
secure solutions to meet customer / client needs while protecting the corporation's assets.
Develop security standards, procedures, and guidelines for multiple platforms.
Recommends information technology strategies, policies, and procedures by evaluating
organization outcomes;
Identifying problems; evaluating trends; anticipating requirements.
Contributes to team effort by accomplishing related results as needed
Projects & Milestones
1. Fiber Optic Network Infrastructure around 40 hectors area
2. Microwave tower & Internet VPN service from Ooredoo
3. Group Email Server (MS Exchange 2013)
4. Centralized Server & Application access to 5 Business Units through VPN
5. CCTV & Security System with minimum 1 month archive
6. 6 TB Cloud Space for all Business Units
7. IP Telephone & Fax ATA with 100 Local no’s & ext.
8. Online Assets Management System with unique barcode and scanner to track all 5 business units
9. Group Internet usage policy by Fortinet firewall
10. Time & Attendance System (online)
11. 5 business units IT Infrastructure renovated & upgraded
12. Centralized Finance Reporting & privileges
13. IT Procurement policy applied to group & 5 BU’s
Milestone to Achieve
1. Centralized Data Center with advance technology
2. ERP Scope Analysis (Oracle/AX/SAP)
3. Transport Tracking System
4. Real Time data backup on cloud (win azure)
5. Group Portal (Internet/Intranet) on SharePoint