Sahar AlGahtani

Sahar AlGahtani

Followers of Sahar AlGahtani375 followers
location of Sahar AlGahtaniSaudi Arabia

Connect with Sahar AlGahtani to Send Message

Connect

Connect with Sahar AlGahtani to Send Message

Connect
  • Timeline

  • About me

    Senior Cyber Security Engineer at AlRaedah Finance

  • Education

    • King Saud University

      2011 - 2015
      Bachelor's degree Information Technology
  • Experience

    • Tata Consultancy Services

      Oct 2015 - Aug 2023

       Implementing and applying Information Security Management System on 30+ local and Global Clients. Initiating and concluding investigation of security breaches including appointing or choosing the investigation panel or team and assisting in disciplinary and legal matters associated with such breaches as necessary. Facilitating and Ensuring deployment of security policies and processes, for consistency, coherence, and comprehensiveness in compliance with the policies and standards, and advise appropriate groups, on the measures to improve these processes. Analyzing information security impact while evaluating any change due to technology or business requirements. Reviewing and maintaining specific security-related training material and assist to implement security awareness programs. Monitoring security related risks for all entities, including projects, support teams and management functions in the organization. Assess current technology architecture for vulnerabilities, weaknesses and for possible upgrades or improvement. Understanding new security technologies for potential utilization in organization development efforts. Facing external ISO audits. Conducting Internal Technical Security audit for Web Security & Email Security: Zscaler & Forcepoint, Firewalls: Palo-alto, and Endpoint Security: CrowdStrike. Manage and configure physical security, disaster recovery and data backup systems. Show less  Implementing and applying Information Security Management System on 7+ local and Global Clients. Initiating and concluding investigation of security breaches including appointing or choosing the investigation panel or team and assisting in disciplinary and legal matters associated with such breaches as necessary. Facilitating and Ensuring deployment of security policies and processes, for consistency, coherence and comprehensiveness in compliance with the policies and standards, and advise appropriate groups on the measures to improve these processes. Analyzing information security impact while evaluating any change due to technology or business requirements. Reviewing and maintaining specific security-related training material and assist to implement security awareness programs. Monitoring security related risks for all entities, including projects, support teams and management functions in the organization. Assess current technology architecture for vulnerabilities, weaknesses and for possible upgrades or improvement. Understanding new security technologies for potential utilization in organization development efforts. Facing external ISO audits. Conducting Internal Technical Security audit for Web Security & Email Security: Zscaler & Forcepoint, Firewalls: Palo-alto, and Endpoint Security: Crowdstrike. Manage and configure physical security, disaster recovery and data backup systems. Show less  Getting the business Requirement document from functional consultant / functional analyst.  Analyze the business Requirement.  Analyze the estimated time for development.  Development of Object (ABAP application).  Unit Testing by Developer.  Releasing the object to test environment.  Prepare technical document of the development.In addition of responsibilities as developer: Managing day-to-day activities of the team. Developing and implementing a timeline to achieve targets. Assigning and delegating tasks to team members. Conducting training of team members to maximize their potential. Conducting performance review of team members.  Prepare and submit status reports for the management. Show less

      • Information Security Manager of Saudi Arabia (Country Manager)

        Apr 2020 - Aug 2023
      • Information Security Manager of All Women Center

        Jul 2018 - Mar 2020
      • SAP Developer

        Oct 2015 - Jun 2018
    • الرائــــــدة Alraedah

      Sept 2023 - now
      Senior Cyber Security Engineer

       Designing and implementing security measures based on business needs and industry best practices. Monitoring potential threats using security tools such as Email Security, Firewalls and Endpoint Security. Creating security policies, procedures, and plans to safeguard data and systems from cyber-attacks. Performing risk assessments to identify potential security threats in an organization’s computing environment. Providing recommendations on new security measures to strengthen existing security systems. Conducting security audits to identify vulnerabilities in computer networks and applications. Working with a team of IT professionals to design and implement new security measures such as Data classification and PAM solutions.  Working with the threat intelligence team. Maintaining the safety and security of the organization's systems and network database to prevent unauthorized access and avoid data breaches. Show less

  • Licenses & Certifications

    • ISO 27001 Lead Auditor - Information Security Certification

      PECB