You are on page 1of 3

IMTEYAZ AHMAD

CIA|CISM|CEH|CHFI|CCIE|MCSE|ITIL

IMTEYAZ AHMAD
Plot-105, Sangam Nagar, Ring Road, Nagpur-440013
MOBILE: 0091-8793443849/7768852385
imteyazahmad05@gmail.com imteyazahmad05@yahoo.com

Career Objective:
To obtain the position of SAP Security Analyst in an organization which will give me an opportunity to provide top-
notch security services.

Core Competencies:

 Excellent communication, interpersonal, and collaborative skills


 Ability to communicate security and risk-related concepts to both non-technical and technical audiences
 Extensive knowledge of business processes related to sales, finance, marketing, and manufacturing
sectors
 First-class planning and organizational abilities
 Flexibility and ability to adapt with new technologies
 Ability to work under pressure and perform multiple tasks simultaneously
 Appreciating management and troubleshooting skills

Technical Skills:

 Familiar with AP Virsa Compliance Calibrator, SAP Virsa Role Expert, SAP Virsa Access Enforcer, Virsa
Firefighter, and Microsoft Windows Office Products
 In-depth knowledge of COBOL400, Client / Server Oracle Forms/Reports, Crystal Reports, VB, Access, and
RPG400
 Broad knowledge about SAP R/3, ECC, BI, HR security, SOX audit, GRC configuration, and CUA

Professional Experience:
Benchmark IT Services (Middle East& Africa)
2012- till date
SAP Security Analyst

 Reviewing, analyzing, and evaluating the security controls used to protect the data of the organization
 Performing tasks related to the development, implementation, and improvement of information security
controls
 Gathering and continually improving cross-functional business area knowledge to generate effective
security controls
 Handling the work of leading small projects and ensuring that all the tasks within a project's life cycle are
addressed
 Soliciting correct and complete business and functional requirements from the SMEs i.e. subject matter
experts
 Updating knowledge about relevant security and compliance standards and utilizing them appropriately
 Speedily responding to business requests as per the requirement of security control changes
Tess Overseas Ltd, KSA
2010 - 2012
SAP Security Analyst

 Developing and maintaining SAP authorization process design as well as related documentation by using
SAPs GRC Access Control modules
 Providing SAP authorization issue resolution support
 Analyzing SAP authorization assignments and segregating duties conflicts
 Communicating and translating SAP authorization requirements among business process owners
 Performing investigations on security related issues and resolving them on time

  Implemented and managed ArcSight ESM and Connectors at multiple locations.


 Prepared and customized report templates and reviewed dynamic content.
 Created notification templates and reported as per specific event attributes.
 Provided support to content development tasks and analyzed ArcSight data sources.
 Designed and developed filter and evaluated significant events.
 Formulated security content data such as filters, reports, signature and mapping.
 Executed database tuning and troubleshooting processes and updated configuration files.
 Documented and reviewed new report templates, functional reports and system configurations.

Sr. Solutions Architect-(DC, MS, Information Security), 2008-2010


BHARTI AIRTEL LTD.
 Define global information risk solutions and security, create information security management systems.
 Manage consultant teams and engineering security.
 Lead Security Architect for Compliance projects and Major IT Governance Risk.
 Organization of programs for ISO 27001.
 Consulting in the areas of out sourcing (Managed/Shared Services, Managed security and BCP/DRP).
 Leading the customer engagement for Data centre capacity planning, architecture, implementation,
optimization, virtualization, migration and Consolidation.
 Network, Storage and Server consolidation feasibility study, application suitability assessment, planning
and implementation.
 Infrastructure and application architecture assessment, design and implementation for high availability,
scalability, performance and security.

Sr.IT Consultant (Information Security & DRP), 2006-2008


MHD LLC, Oman.

 Planning, designing and implementation of secure, reliable, scalable and efficient IT infrastructure.
 Infrastructure and application architecture assessment, design and implementation for high availability,
scalability, performance and security.
 Network, Storage and Server consolidation feasibility study, application suitability assessment, planning
and implementation.
 Building Partnership with Vendors & Industry Leaders to supply highest quality solutions.
 Providing the best-fit (built to suit) DC& DR solution that is aligned with the current and future needs of
the Company at affordable price.
 Data centre capacity planning, architecture, implementation, Consolidation, optimization Virtualization
and migration.
 Data centre setup and Operational Capabilities Assessment.
 Costing all phases of projects and Preparing BOM/BOQ
 Conducting training for Presales and Sales team on DRP and other critical challenges of enterprise
customers.

Subject Matter Expert (Networking & security), DEC 2003- APR 2006
LUCENT TECHNOLOGIES, BRUNEI DARUSSALAM.
• Managed network security operations team.
• Prepared information security evaluation for new projects.
• Project improvement documentation, delivered process documentation.
• Information Security Operations liaison for IT initiatives.

IT Executive, Sept 2000-Nov 2003


SKJ GROUP, BRUNEI DARUSSALAM.
• Business continuity Planning& deployment.
• Trained and mentored employees in many job descriptions regarding security and system basics, best
practices, etc.
• Managed and organized backup infrastructure.
• Designed and implement network monitoring system.
• Cisco network management (routers, switches, firewalls).
• Systems Architect for security project.
Systems& Network Engineer
NETTECH SOLUTIONS AUG1996-AUG2000
• Troubleshooting Hardware/Software& networking Issues.
• Installing, configuring, testing, upgrading and administering Servers.
• Build Servers and Workstations including complete machines from empty boxes
• Used experience in company to focus on securing information and systems.
• Documented exiting and in-development policies, procedures, and systems.

• Deployed Pix intrusion detection sensor network

Educational Background

Master of Science (Information Technology)

Professional Certification

 Cisco Certified Internetwork Expert (CCIE)


 Certified Information Security Manager(CISM)
 Certified Ethical Hacker(CEH)
 Certified Computer Hacking Forensic Investigator (CHFI)
 Training in Project Management Professional (PMP).
 Training In Information Technology Infrastructure Library (ITIL).
 Cisco Certified Network Professional (CCNP)
 Sun Solaris System Administration 8(I & II)
 Microsoft Certified System Engineer (MCSE 2000

You might also like