I worked as Senior Accountant at IDH ( Integrated diagnostic holdings for more than 4 years and throughout my career, I have worked on several areas such as Inventory, Cost, AP, Fixed Assets, related Parties and performed compliance related to those areas.
I have got excellent experience in SAP FI & MM Financial Accounting and reporting. Also, I am currently pursuing a degree of CMA.
my experience in accounting and finance and all skills which i earn in my life and i hope to find a new chance in a new company to increasing my knowledge and gives me more skills to solve any problem
Ensuring Security and Compliance in a Data DelugeTripwire
The average IT infrastructure experiences millions, if not billions of events a day. Most are non-critical or business-as-usual. So how to you find the ones that aren't-the ones that threaten IT security or impact compliance? Organizations collect more than enough data to make these determinations; they just don't have automated intelligence that makes this data useful. As a result, they often take months to detect a breach. Learn how you can reduce the breach-to-detection gap from months to minutes to keep your data safe and prove compliance.
In this webcast, Tim Zonca, Product Marketing Manager for Tripwire Log Center, and Ed Rarick, Tripwire PCI Evangelist, discuss:
Why the breach-to-detection gap is so long
What capabilities organizations need to reduce this gap
How Tripwire VIA solutions combine to reduce the gap without the complexity and bloat of traditional security solutions
How to Approach the NYDFS Proposed Cybersecurity RequirementsKyle Brown
The New York Department of Financial Services (NYDFS) is expected to pass a proposed cybersecurity regulation in January 2017, called "Cybersecurity Requirements for Financial Services Companies".
In the light of the imminent regulatory update, most financial institutions, and insurance providers are preparing to comply with the fundamental requirements that the NYDFS will likely adopt.
In this webinar, we covered:
- Explanations of the regulation’s key legal requirements;
- How the regulation interacts with other data security laws;
- Industry best practices for securing data;
- The value of online compliance training.
I worked as Senior Accountant at IDH ( Integrated diagnostic holdings for more than 4 years and throughout my career, I have worked on several areas such as Inventory, Cost, AP, Fixed Assets, related Parties and performed compliance related to those areas.
I have got excellent experience in SAP FI & MM Financial Accounting and reporting. Also, I am currently pursuing a degree of CMA.
my experience in accounting and finance and all skills which i earn in my life and i hope to find a new chance in a new company to increasing my knowledge and gives me more skills to solve any problem
Ensuring Security and Compliance in a Data DelugeTripwire
The average IT infrastructure experiences millions, if not billions of events a day. Most are non-critical or business-as-usual. So how to you find the ones that aren't-the ones that threaten IT security or impact compliance? Organizations collect more than enough data to make these determinations; they just don't have automated intelligence that makes this data useful. As a result, they often take months to detect a breach. Learn how you can reduce the breach-to-detection gap from months to minutes to keep your data safe and prove compliance.
In this webcast, Tim Zonca, Product Marketing Manager for Tripwire Log Center, and Ed Rarick, Tripwire PCI Evangelist, discuss:
Why the breach-to-detection gap is so long
What capabilities organizations need to reduce this gap
How Tripwire VIA solutions combine to reduce the gap without the complexity and bloat of traditional security solutions
How to Approach the NYDFS Proposed Cybersecurity RequirementsKyle Brown
The New York Department of Financial Services (NYDFS) is expected to pass a proposed cybersecurity regulation in January 2017, called "Cybersecurity Requirements for Financial Services Companies".
In the light of the imminent regulatory update, most financial institutions, and insurance providers are preparing to comply with the fundamental requirements that the NYDFS will likely adopt.
In this webinar, we covered:
- Explanations of the regulation’s key legal requirements;
- How the regulation interacts with other data security laws;
- Industry best practices for securing data;
- The value of online compliance training.
Data Governance, Compliance and Security in Hadoop with ClouderaCaserta
In our recent Big Data Warehousing Meetup, we discussed Data Governance, Compliance and Security in Hadoop.
As the Big Data paradigm becomes more commonplace, we must apply enterprise-grade governance capabilities for critical data that is highly regulated and adhere to stringent compliance requirements. Caserta and Cloudera shared techniques and tools that enables data governance, compliance and security on Big Data.
For more information, visit www.casertaconcepts.com
It is no longer enough to focus our efforts on networks and endpoints. As IT changes continue to occur, organizations need to keep pace and advance their security by focusing on the data itself through the development of a data-centric security program.
A comprehensive data-centric security strategy includes the following 10 key elements:
1 - Data discovery
2 - Data classification
3 - Data tagging & watermarking
4 - Data loss prevention
5 - Data visibility
6 - Encryption strategies
7 - Enhanced gateway controls
8 - Identity management
9 - Cloud access
10 - Continuous education
This presentation contains a synopsis of each element. As organizations develop a data-centric security program, it is important to assess current maturity levels and determine which areas need to be prioritized and remediated first.
Seven Key Elements of a Successful Encryption StrategySirius
Security challenges combined with eager cyber attackers have led enterprise data breaches to increase at an alarming pace. For example, last year in the second quarter alone there were 237 data breaches that exposed more than 175 million records worldwide—almost 2 million stolen records per day. Of all those stolen records, only one percent were encrypted and therefore useless to hackers.
While the value of encryption is understood, it can be an intimidating solution to implement and most companies struggle to use it effectively.
You can leverage encryption to help provide persistent data protection once you understand the key elements of a successful strategy.
Myths and realities of data security and compliance - Isaca Alanta - ulf matt...Ulf Mattsson
Myths & Realities of Data Security & Compliance - ISACA Atlanta - Ulf Mattsson Jul 22 2016.
Data breaches are on the rise. The constant threat of cyber attacks combined with the high cost and a shortage of skilled security engineers has put many companies at risk. There is a shift in cybersecurity investment and IT risk and security leaders must move from trying to prevent every threat and acknowledge that perfect protection is not achievable. PCI DSS 3.2 is out with an important update on data discovery and requirements to detect security control failures.
In this session, cybersecurity expert Ulf Mattsson will highlight current trends in the security landscape based on major industry report findings, and discuss how we should re-think our security approach.
As you will note, I am seeking a position in which my training experience and my educational background will be of a value.
I feel quite confident, that I can utilize my abilities and blend well in a position requiring excellent communications skills. My proficiency in learning new ideas and methods quickly, plus a willingness to develop my abilities to the fullest potentials are valuable assets that should make me an excellent candidate for a position within your organization.
I feel that the combination of my education and abilities qualifies me to continue to contribute to the growth of a progressive company. I would like the opportunity to meet with you to discuss your needs and organizational objectives and my abilities to fulfill them.
Thank you for your time and consideration. I will look forward to hearing from you soon
Thanks &Best Regards
Mohamed Abdul Nabi
050-6445250
1. Maged Ali Bayoumi Ali Oteify
Mobile: 002-01121289728 - 01012505009
E-mail Address: mazhawk@yahoo.com
Postal Address: Ghamra, Cairo, Egypt
----------------------------------
Objective
Secure a responsible position in financial accounting at a reputable firm,
sharing my breadth of experience, abilities, IT and computer skills to add value
and to have the opportunity for challenges and career advancement, while
gaining knowledge of new skills and expertise. I'm also passionate about
gaining experience in management accounting field, project management and
business administration.
Work Experience:
General Accountant, CompleteEnergy (Solar Systems), Nasr City, Cairo.
Jan 2016 to present
Strengths and achievements:
o Handling suppliers accounts statements.
o Preparing assets depreciations statement.
o Auditing daily transactions and employee custody.
o Preparing projects’ work under construction detailed statements by collecting and
reviewing project expenses.
o Translating incoming mails from foreign suppliers & banks, and writing replies.
o Providing the financial management with financial reports needed.
o Assisting in organizing whole company's procedures and paper work sequence for all
sections as an assistant auditor.
o Handling project accounting tasks.
o Gained administration and reporting skills.
Account Advisor, VodafoneUK, 6th
of October, Giza.
Nov2015to Dec 2015
Strengths and achievements:
o Handle British Customers inquires and complaints.
o Log customer details on the CRM.
o Provide customer with accurate information and right solutions.
o Performs other duties as assigned by management.
2. Accountant, Chartered accountant office, Giza.
Oct 2011 to Sep 2014
Strengths and achievements:
o Co-ordinate with all Departments to submit budgets in order to prepare the Profit and Loss
statements and to use as a measurement tool thru the entire year.
o Prepare and send report (Income statement, gross profit, Variance Analysis)to company in
order to give an accurate picture of Company’s financial performance.
o Reconciling financial discrepancies by collecting and analyzing account information.
o Preparing special financial reports.
BranchAccountant, Bin karam furniture, El Buraimy ,Oman.
Jul 2010 to Jun 2011
Strengths and achievements:
o Preparing and maintaining branch expenses and revenues.
o Handling customers’ accounts.
o preparing monthly financial reports for management
o Summarizing current branch financial status
o Assist auditors in their annual audit review
Supervising construction/concrete work, Privateconstructions,Cairo.
Jan 2007 to Nov 2009
Strengths and achievements:
o Supervising following up workers.
o Handling all payroll
o Handling Petty cash.
o Buying work materials.
Trainee Accountant, Chartered accountantoffice, Giza.
Dec 2003 to Dec 2006
Strengths and achievements:
o Preparing daily transactions and general ledger.
o Assist in Preparing asset, liability, and capital account entries by compiling and analyzing
account information.
o Participating in auditing companies selling air conditioners.
o Participating in auditing companies manufacturing electrical tools/appliances.
o Assist in preparing monthly financial reports.
Professional certificates
Certificate in Auditing. Registered as an authorized accountant & auditor.
3. Education:
B.Sc. Commerce, Dept. of Accounting, Faculty of Commerce, Assiut University,
Egypt, 2002.
Diploma in English Translation, a two- year course, Faculty of Arts, Cairo
University, Egypt, 2009.
Skills:
Personal skills:
Energetic, fast learner, self-motivated.
Ability to organize and prioritize workloads and to meet deadlines.
Strong verbal, written and analytical skills.
Ability to understand and execute instructions well.
Dealing and handling new accounting or computer programs.
Handling electronic devices.
Positive mind-set about foreign cultures and accommodating differences.
Traveling experience, SaudiArabia, Malaysia, Libya, Oman & visited Singapore.
Languages:
Arabic – Native.
English – very good.
Hindi - Fair.
Urdu - Fair.
Computer & It:
Good working knowledge of SAP.
Experience with Excel spreadsheets.
MSOffice (word/ excel/ access/ power point).
Computer maintenance.
Other:
Received training on how to provide electrical construction work for houses,
at Salizian Don Bosco, an Italian institute in Cairo, Egypt. I received a general
certificate in electricity from this institute.
Egyptian driving license
Omani driving license
Personal data
Date of Birth: 16/12/1981
Nationality: Egyptian
Marital Status: married