SlideShare a Scribd company logo
Nachaat Mohamed 
E-mail: eng_cne@yahoo.com 
Contact No: +965-97944004 
Objective 
To be associated with a progressive organization that gives me the scope to apply 
knowledge and Skills development through my education and effective assimilation of 
knowledge. To be a part the team that dynamically works towards the growth of the 
organization and self. Ready to work all over the world. 
Total Experience 
(15 Years) 
Central Statistical of bureau (Kuwait) (Jan 2010 to till Now) 
Currently working as Senior Penetration Tester Information Security 
http://csb.gov.kw 
Central Statistical of bureau (Kuwait)(Jan 2008 to to Jan 2010) 
Working System Analyst And Oracle developer at CSB Kuwait 
http://csb.gov.kw 
Silver Star Co (Egypt/KafrElshikh: Aug, 2006-Jan 2008). 
Worked Network specialist & Security Analyst 
International Negotiator (KSA / Alehsa) Jan 2004 - Jul 2006 
Worked Oracle developer and Network specialist 
Top computer center (Lebanon / Beirut Jan 2000 - May 2003) 
Worked Technical Support
Professional 
Qualification 
Course : Bachelor Degree IT (Information Security) 
University : California University Los Anglos 
Course : Bachelor degree IT(Software Engineering ) 
University : West Clayton University 
Course : Diploma Computer IT 
University : ( Sadat Academy) Egypt 
Professional 
Enhancements 
 Certified Ethical Hacker (C|EH ) 
 Computer hacking forensic investigator (C|HFI) 
 EC Council Certified Security Analyst (E|CSA) 
 Certified Network Engineer (CNE). 
 Certified Information Security practitioner (CISP) 
 Certified Network Security Professional (CNSP) 
 Certified Web Application Security Professional (CWASP) 
 Certified Information Systems Security Expert (CISSE) 
 Certified technical support professional (CTSP ) 
 Certified wimax professional (CWIM) 
 Security Awareness (RSA) World Bank. 
 Oracle (Database &Developer) 
 Oracle Business Intelligence Enterprise Edition ( OBIEE) 
Highlights 
Technical Skills : 
 Automated scans & manual security testing for web applications based on 
different domains like Banking, Insurance, Government Web/Digital Marketing, 
Online shopping, etc. 
 Strong Web application security experience with through understanding of web 
application vulnerabilities 
 experience of computer forensics, network exploitation, ethical hacking, 
penetration testing and tool development a plus 
 Network penetration testing using automated tools like Nmap & Nessus. Manual
 Experience in application level attacks, bypassing firewalls, evading intrusion 
detection and Strong Problem solving. 
 Strong technical skill Networking (LAN – WAN - Routers, Switches ) 
 Extensive experience in security standards/best practices (ISO 27001,SANS) 
 Extensive experience in Oracle database (9i , 10g ,11g) and developer ( SQL , 
PL/SQL ) & Form , Report 
 Experience with at least one network and web application vulnerability scanners 
as well as source code analysis tools 
 Experience of database, application, and Knowledge of Web server design and 
implementation 
 Knowledge of the software development lifecycle in a large enterprise 
 Development background in Python 
 Knowledge OBIEE 11g ( Data warehouse and BI) 
 Experience programing SQL / PL/SQl (Oracle) 
 Performing Penetration Testing & Vulnerability Assessment as per client 
requirements for different 3-tier web applications as well as 2-tier client server 
applications also. Creation & execution of test cases. 
 Manual report generation for web application & network scans using MS Office 
tools. Automated reporting using MS SharePoint, InfoPath with detailed 
description of vulnerabilities, supporting screenshots & detailed recommendations 
to remediate the issue. 
 Performing rescans, co-coordinating with project development and QA team to 
remediate the vulnerabilities reported in security scans. Client interaction & 
management discussions to explain the issue reported. 
Functional Skills : 
 Knowledge Management: Knowledge sharing sessions within the organization & 
team in form of training, whitepapers, reusable documents, presentations, 
preparation of baseline documents (Checklist, Methodology, Templates) & 
reviews them on monthly basis. 
 Process Updates: Updating the organization’s internal database used for defining 
Risk Ratings, Severity, Response required by following latest trends in 
Information Security domain; Internal trainings and preparation of process update 
documents. 
Tools & 
Platforms 
 (Kali Linux – Backtrack – Buqtraq )Acunetix Vulnerability Scanner, AppScan 
Vulnerability Scanner, Burp Suite Professional, Paros, Web Scarab, etc. 
 Nessus, Nmap, Winhex, Wireshark,Oracle10g,11g,oracle developer 6i and OBiee
etc. 
 Windows 98/2000/XP, Windows Server 2000/03; 2008 , SQL Server, 
Job 
Responsibilities 
As Oracle 
Developer 
 Making desktop application by oracle developer and Reports by Oracle Reports 6I 
and 10g . 
 Installation, configuration and upgrading of Oracle server software and related 
products 
 Establish and maintain sound backup and recovery policies and procedures 
 Take care of the Database design and implementation 
 Implement and maintain database security (create and maintain users and roles, 
assign privileges) 
 Setup and maintain documentation and standards 
 Work as part of a team and provide 7x24 support when required 
Job 
Responsibilities 
As Consultant 
Information 
Security 
 Project planning, management & execution at different onsite locations as well as 
offsite. Handling clients call, discussions regarding scope and activities to be 
performed, estimation of project execution time, etc. 
 Preparing estimations and schedules, identifying scenarios, accomplishing test 
case preparation and test case execution in a controlled environment. 
 Understanding the functional specification using the functional document, SRS, 
etc provided by the client and doing the test planning, Co-ordination with IT 
Heads & Project Managers for executing projects. 
 Vulnerability Assessment (VA) or Penetration Testing (PT) for web application 
and client server applications based on additional security audit pack 
(incorporating OWASP standards). 
 Performing automated scans, manually verifying the scan results for false 
positives, reporting vulnerabilities using proper details, screen shots and 
recommendation to rectify them. Performing the rescans, if required. 
 Defining risk ratings for the vulnerabilities found in the application, impact 
analysis, risk assessment specifying the security aspects and recommendation 
work for each individual vulnerability. 
 Discussing the reported vulnerabilities and making them understand with 
development & QA team as well as senior management by conducting review 
meetings & presentations. 
Personal 
Details 
Email : eng_cne@yahoo.com 
Adressa : Kuwait - Salwa 
Nationality : Kuwait 
Cell No : +965-97944004 
Marital Status : Married. 
Date of Birth :1977 
DECLARATION: 
I hereby declare that all the above stated information is true to the best of my knowledge.

More Related Content

What's hot

Application Security Testing for Software Engineers ,Developers and testers
Application Security Testing for Software Engineers ,Developers and testersApplication Security Testing for Software Engineers ,Developers and testers
Application Security Testing for Software Engineers ,Developers and testers
Gustavo Nieves Arreaza
 
EISA Considerations for Web Application Security
EISA Considerations for Web Application SecurityEISA Considerations for Web Application Security
EISA Considerations for Web Application Security
Larry Ball
 
Divya1CV (1)
Divya1CV (1)Divya1CV (1)
Divya1CV (1)
Divya Rajappa
 
Raul Ruano's Resume 2014
Raul Ruano's Resume 2014Raul Ruano's Resume 2014
Raul Ruano's Resume 2014
Raul Ruano
 
SUCHITABADODEKAR
SUCHITABADODEKARSUCHITABADODEKAR
SUCHITABADODEKAR
Suchita Badodekar
 
Resume Mandeep
Resume MandeepResume Mandeep
Resume Mandeep
Mandeep kaur
 
Prakash_Resume
Prakash_ResumePrakash_Resume
Prakash_Resume
Prakash Murugesan
 
Security Fix or Workaround
Security Fix or WorkaroundSecurity Fix or Workaround
Security Fix or Workaround
Bohdan Serednytskyi
 
Security for Architects and Developers
Security for Architects and DevelopersSecurity for Architects and Developers
Security for Architects and Developers
Shamir Charania
 
Cv ( puneet aggarwal )
Cv ( puneet aggarwal )Cv ( puneet aggarwal )
Cv ( puneet aggarwal )
Puneet Aggarwal
 
Gowtham G - Profile _ IT security
Gowtham G - Profile _ IT securityGowtham G - Profile _ IT security
Gowtham G - Profile _ IT security
Gowtham Dinesh
 
Software Engineer
Software EngineerSoftware Engineer
Software Engineer
Ra'ed Ghareeb
 
web security
web securityweb security
My New Resume
My New ResumeMy New Resume
My New Resume
Daniel Anderson
 
Greg Anderson Resume
Greg Anderson ResumeGreg Anderson Resume
Greg Anderson Resume
Greg Anderson
 
Resme1
Resme1Resme1
My Resume
My ResumeMy Resume
My Resume
Jesus Mendoza
 
OWASP Khartoum - Top 10 A6 - 8th meeting - Security Misconfiguration
OWASP Khartoum - Top 10 A6 - 8th meeting - Security MisconfigurationOWASP Khartoum - Top 10 A6 - 8th meeting - Security Misconfiguration
OWASP Khartoum - Top 10 A6 - 8th meeting - Security Misconfiguration
OWASP Khartoum
 

What's hot (18)

Application Security Testing for Software Engineers ,Developers and testers
Application Security Testing for Software Engineers ,Developers and testersApplication Security Testing for Software Engineers ,Developers and testers
Application Security Testing for Software Engineers ,Developers and testers
 
EISA Considerations for Web Application Security
EISA Considerations for Web Application SecurityEISA Considerations for Web Application Security
EISA Considerations for Web Application Security
 
Divya1CV (1)
Divya1CV (1)Divya1CV (1)
Divya1CV (1)
 
Raul Ruano's Resume 2014
Raul Ruano's Resume 2014Raul Ruano's Resume 2014
Raul Ruano's Resume 2014
 
SUCHITABADODEKAR
SUCHITABADODEKARSUCHITABADODEKAR
SUCHITABADODEKAR
 
Resume Mandeep
Resume MandeepResume Mandeep
Resume Mandeep
 
Prakash_Resume
Prakash_ResumePrakash_Resume
Prakash_Resume
 
Security Fix or Workaround
Security Fix or WorkaroundSecurity Fix or Workaround
Security Fix or Workaround
 
Security for Architects and Developers
Security for Architects and DevelopersSecurity for Architects and Developers
Security for Architects and Developers
 
Cv ( puneet aggarwal )
Cv ( puneet aggarwal )Cv ( puneet aggarwal )
Cv ( puneet aggarwal )
 
Gowtham G - Profile _ IT security
Gowtham G - Profile _ IT securityGowtham G - Profile _ IT security
Gowtham G - Profile _ IT security
 
Software Engineer
Software EngineerSoftware Engineer
Software Engineer
 
web security
web securityweb security
web security
 
My New Resume
My New ResumeMy New Resume
My New Resume
 
Greg Anderson Resume
Greg Anderson ResumeGreg Anderson Resume
Greg Anderson Resume
 
Resme1
Resme1Resme1
Resme1
 
My Resume
My ResumeMy Resume
My Resume
 
OWASP Khartoum - Top 10 A6 - 8th meeting - Security Misconfiguration
OWASP Khartoum - Top 10 A6 - 8th meeting - Security MisconfigurationOWASP Khartoum - Top 10 A6 - 8th meeting - Security Misconfiguration
OWASP Khartoum - Top 10 A6 - 8th meeting - Security Misconfiguration
 

Similar to Nachaat Mohamed resume

Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1
Carlasha Jenkins
 
Lancy-Curriculum Vitae
Lancy-Curriculum VitaeLancy-Curriculum Vitae
Lancy-Curriculum Vitae
Lancy Menezes
 
Saravanan_Resume_IBM Updated
Saravanan_Resume_IBM UpdatedSaravanan_Resume_IBM Updated
Saravanan_Resume_IBM Updated
Saravanan Manickam
 
Aakash Resume
Aakash ResumeAakash Resume
Aakash Resume
Aakash Montadka
 
Abhishek-New (1)
Abhishek-New (1)Abhishek-New (1)
Abhishek-New (1)
Abhishek Sa
 
NPryadko-LinkedInResume
NPryadko-LinkedInResumeNPryadko-LinkedInResume
NPryadko-LinkedInResume
Nadia Pryadko
 
Sanjoy debnath resume
Sanjoy debnath resumeSanjoy debnath resume
Sanjoy debnath resume
Sanjoy Debnath
 
Resume_Al-Mamun_Akanda_2016
Resume_Al-Mamun_Akanda_2016Resume_Al-Mamun_Akanda_2016
Resume_Al-Mamun_Akanda_2016
Al-Mamun Akanda
 
SFDC_BRAJ
SFDC_BRAJSFDC_BRAJ
SFDC_BRAJ
Brajmohan Sharma
 
Mycv Sas
Mycv SasMycv Sas
Robert Sheppard Resume
Robert Sheppard ResumeRobert Sheppard Resume
Robert Sheppard Resume
Robert Sheppard
 
tarunidhar
tarunidhartarunidhar
Fareeha Resume
Fareeha ResumeFareeha Resume
Fareeha Resume
Fareeha Nadeem
 
Robert donald resume iam 1
Robert donald resume iam 1Robert donald resume iam 1
Robert donald resume iam 1
Robert Donald
 
Mohini
MohiniMohini
Mohini
Man Mohini
 
Microsoft .Net Professional
Microsoft .Net ProfessionalMicrosoft .Net Professional
Microsoft .Net Professional
Ahsan Ahmed
 
SaiBhaskar-Resume
SaiBhaskar-ResumeSaiBhaskar-Resume
SaiBhaskar-Resume
Saibhaskar Yenumula
 
Emad Samy Mahmoud Mekdad
Emad Samy Mahmoud MekdadEmad Samy Mahmoud Mekdad
Emad Samy Mahmoud Mekdad
Emad
 
Resume
ResumeResume
GM open positions FEB-2016
GM open positions  FEB-2016 GM open positions  FEB-2016
GM open positions FEB-2016
Gonen Barkan
 

Similar to Nachaat Mohamed resume (20)

Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1
 
Lancy-Curriculum Vitae
Lancy-Curriculum VitaeLancy-Curriculum Vitae
Lancy-Curriculum Vitae
 
Saravanan_Resume_IBM Updated
Saravanan_Resume_IBM UpdatedSaravanan_Resume_IBM Updated
Saravanan_Resume_IBM Updated
 
Aakash Resume
Aakash ResumeAakash Resume
Aakash Resume
 
Abhishek-New (1)
Abhishek-New (1)Abhishek-New (1)
Abhishek-New (1)
 
NPryadko-LinkedInResume
NPryadko-LinkedInResumeNPryadko-LinkedInResume
NPryadko-LinkedInResume
 
Sanjoy debnath resume
Sanjoy debnath resumeSanjoy debnath resume
Sanjoy debnath resume
 
Resume_Al-Mamun_Akanda_2016
Resume_Al-Mamun_Akanda_2016Resume_Al-Mamun_Akanda_2016
Resume_Al-Mamun_Akanda_2016
 
SFDC_BRAJ
SFDC_BRAJSFDC_BRAJ
SFDC_BRAJ
 
Mycv Sas
Mycv SasMycv Sas
Mycv Sas
 
Robert Sheppard Resume
Robert Sheppard ResumeRobert Sheppard Resume
Robert Sheppard Resume
 
tarunidhar
tarunidhartarunidhar
tarunidhar
 
Fareeha Resume
Fareeha ResumeFareeha Resume
Fareeha Resume
 
Robert donald resume iam 1
Robert donald resume iam 1Robert donald resume iam 1
Robert donald resume iam 1
 
Mohini
MohiniMohini
Mohini
 
Microsoft .Net Professional
Microsoft .Net ProfessionalMicrosoft .Net Professional
Microsoft .Net Professional
 
SaiBhaskar-Resume
SaiBhaskar-ResumeSaiBhaskar-Resume
SaiBhaskar-Resume
 
Emad Samy Mahmoud Mekdad
Emad Samy Mahmoud MekdadEmad Samy Mahmoud Mekdad
Emad Samy Mahmoud Mekdad
 
Resume
ResumeResume
Resume
 
GM open positions FEB-2016
GM open positions  FEB-2016 GM open positions  FEB-2016
GM open positions FEB-2016
 

Nachaat Mohamed resume

  • 1. Nachaat Mohamed E-mail: eng_cne@yahoo.com Contact No: +965-97944004 Objective To be associated with a progressive organization that gives me the scope to apply knowledge and Skills development through my education and effective assimilation of knowledge. To be a part the team that dynamically works towards the growth of the organization and self. Ready to work all over the world. Total Experience (15 Years) Central Statistical of bureau (Kuwait) (Jan 2010 to till Now) Currently working as Senior Penetration Tester Information Security http://csb.gov.kw Central Statistical of bureau (Kuwait)(Jan 2008 to to Jan 2010) Working System Analyst And Oracle developer at CSB Kuwait http://csb.gov.kw Silver Star Co (Egypt/KafrElshikh: Aug, 2006-Jan 2008). Worked Network specialist & Security Analyst International Negotiator (KSA / Alehsa) Jan 2004 - Jul 2006 Worked Oracle developer and Network specialist Top computer center (Lebanon / Beirut Jan 2000 - May 2003) Worked Technical Support
  • 2. Professional Qualification Course : Bachelor Degree IT (Information Security) University : California University Los Anglos Course : Bachelor degree IT(Software Engineering ) University : West Clayton University Course : Diploma Computer IT University : ( Sadat Academy) Egypt Professional Enhancements  Certified Ethical Hacker (C|EH )  Computer hacking forensic investigator (C|HFI)  EC Council Certified Security Analyst (E|CSA)  Certified Network Engineer (CNE).  Certified Information Security practitioner (CISP)  Certified Network Security Professional (CNSP)  Certified Web Application Security Professional (CWASP)  Certified Information Systems Security Expert (CISSE)  Certified technical support professional (CTSP )  Certified wimax professional (CWIM)  Security Awareness (RSA) World Bank.  Oracle (Database &Developer)  Oracle Business Intelligence Enterprise Edition ( OBIEE) Highlights Technical Skills :  Automated scans & manual security testing for web applications based on different domains like Banking, Insurance, Government Web/Digital Marketing, Online shopping, etc.  Strong Web application security experience with through understanding of web application vulnerabilities  experience of computer forensics, network exploitation, ethical hacking, penetration testing and tool development a plus  Network penetration testing using automated tools like Nmap & Nessus. Manual
  • 3.  Experience in application level attacks, bypassing firewalls, evading intrusion detection and Strong Problem solving.  Strong technical skill Networking (LAN – WAN - Routers, Switches )  Extensive experience in security standards/best practices (ISO 27001,SANS)  Extensive experience in Oracle database (9i , 10g ,11g) and developer ( SQL , PL/SQL ) & Form , Report  Experience with at least one network and web application vulnerability scanners as well as source code analysis tools  Experience of database, application, and Knowledge of Web server design and implementation  Knowledge of the software development lifecycle in a large enterprise  Development background in Python  Knowledge OBIEE 11g ( Data warehouse and BI)  Experience programing SQL / PL/SQl (Oracle)  Performing Penetration Testing & Vulnerability Assessment as per client requirements for different 3-tier web applications as well as 2-tier client server applications also. Creation & execution of test cases.  Manual report generation for web application & network scans using MS Office tools. Automated reporting using MS SharePoint, InfoPath with detailed description of vulnerabilities, supporting screenshots & detailed recommendations to remediate the issue.  Performing rescans, co-coordinating with project development and QA team to remediate the vulnerabilities reported in security scans. Client interaction & management discussions to explain the issue reported. Functional Skills :  Knowledge Management: Knowledge sharing sessions within the organization & team in form of training, whitepapers, reusable documents, presentations, preparation of baseline documents (Checklist, Methodology, Templates) & reviews them on monthly basis.  Process Updates: Updating the organization’s internal database used for defining Risk Ratings, Severity, Response required by following latest trends in Information Security domain; Internal trainings and preparation of process update documents. Tools & Platforms  (Kali Linux – Backtrack – Buqtraq )Acunetix Vulnerability Scanner, AppScan Vulnerability Scanner, Burp Suite Professional, Paros, Web Scarab, etc.  Nessus, Nmap, Winhex, Wireshark,Oracle10g,11g,oracle developer 6i and OBiee
  • 4. etc.  Windows 98/2000/XP, Windows Server 2000/03; 2008 , SQL Server, Job Responsibilities As Oracle Developer  Making desktop application by oracle developer and Reports by Oracle Reports 6I and 10g .  Installation, configuration and upgrading of Oracle server software and related products  Establish and maintain sound backup and recovery policies and procedures  Take care of the Database design and implementation  Implement and maintain database security (create and maintain users and roles, assign privileges)  Setup and maintain documentation and standards  Work as part of a team and provide 7x24 support when required Job Responsibilities As Consultant Information Security  Project planning, management & execution at different onsite locations as well as offsite. Handling clients call, discussions regarding scope and activities to be performed, estimation of project execution time, etc.  Preparing estimations and schedules, identifying scenarios, accomplishing test case preparation and test case execution in a controlled environment.  Understanding the functional specification using the functional document, SRS, etc provided by the client and doing the test planning, Co-ordination with IT Heads & Project Managers for executing projects.  Vulnerability Assessment (VA) or Penetration Testing (PT) for web application and client server applications based on additional security audit pack (incorporating OWASP standards).  Performing automated scans, manually verifying the scan results for false positives, reporting vulnerabilities using proper details, screen shots and recommendation to rectify them. Performing the rescans, if required.  Defining risk ratings for the vulnerabilities found in the application, impact analysis, risk assessment specifying the security aspects and recommendation work for each individual vulnerability.  Discussing the reported vulnerabilities and making them understand with development & QA team as well as senior management by conducting review meetings & presentations. Personal Details Email : eng_cne@yahoo.com Adressa : Kuwait - Salwa Nationality : Kuwait Cell No : +965-97944004 Marital Status : Married. Date of Birth :1977 DECLARATION: I hereby declare that all the above stated information is true to the best of my knowledge.